Sample records for unspecified flaw lets

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  2. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  3. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  4. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code...

  5. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  6. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

  7. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  8. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP97Cross-SiteVulnerability |Execute

  9. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  10. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  11. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

  12. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player...

  13. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  14. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Energy Savers [EERE]

    107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am...

  15. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  16. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  17. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  18. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  19. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivilegesUnauthorized Access | Department of

  20. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146Access |

  1. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService or

  2. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94:Vulnerabilities | DepartmentUnauthorized

  3. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  4. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  5. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Broader source: Energy.gov (indexed) [DOE]

    RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were...

  6. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on...

  7. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  8. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

  9. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  10. V-139: Cisco Network Admission Control Input Validation Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject...

  11. V-075: EMC AlphaStor Command Injection and Format String Flaws...

    Broader source: Energy.gov (indexed) [DOE]

    5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

  12. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  13. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  14. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  15. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpact |

  16. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

    1983-01-01T23:59:59.000Z

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  17. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  18. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department of

  19. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code |Department

  20. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScriptingAttacks

  1. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  2. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  3. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID...

  4. U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-0307 CVE-2012-0308 CVE-2012-3579 CVE-2012-3580 CVE-2012-3581 IMPACT ASSESSMENT: Medium Discussion: Symantec was notified of several security issues impacting Symantec's...

  5. U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1Department ofRemote

  6. LADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

    E-Print Network [OSTI]

    Ling, Shiqing

    and Van Dijk (1996) studied several stock market indexes by AR(1)-GJR(1, 1) models, Zhu and Ling (2011) fitted a MA(3)-GARCH(1, 1) model to the world oil prices, see also Tsay (2005) for more empiricalLADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

  7. Shipment of Small Quantities of Unspecified Radioactive Material in Chalfant Packagings

    SciTech Connect (OSTI)

    Smith, Allen; Abramczyk, Glenn; Nathan, Steven; Bellamy, Steve

    2009-06-12T23:59:59.000Z

    In the post 6M era, radioactive materials package users are faced with the disciplined operations associated with use of Certified Type B packagings. Many DOE, commercial and academic programs have a requirement to ship and/or store small masses of poorly characterized or unspecified radioactive material. For quantities which are small enough to be fissile exempt and have low radiation levels, the materials could be transported in a package which provides the required containment level. Because their Chalfant type containment vessels meet the highest standard of containment (helium leak-tight), the 9975, 9977, and 9978 are capable of transporting any of these contents. The issues associated with certification of a high-integrity, general purpose package for shipping small quantities of unspecified radioactive material are discussed and certification of the packages for this mission is recommended.

  8. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

  9. Fabrication of specimens with controlled flaws

    SciTech Connect (OSTI)

    Edwards, R.L.; Gruber, G.J.; Watson, P.D. [Southwest Research Inst., San Antonio, TX (United States)

    1995-10-01T23:59:59.000Z

    Most nondestructive evaluation (NDE) codes and standards require that the NDE equipment be calibrated using a calibration block. Ultrasonic testing (UT) historically has required the use of side-drilled or flat-bottom holes or notches. Recent technology has recognized that the acoustic response of real flaws is not directly comparable to artificial reflectors. The need arose to manufacture UT test specimens that contained real flaws of known size, shape, position, and orientation. The 1989 Section XI ASME Code, Appendix VIII (ASME Code, 1989), requires NDE qualification of equipment, procedures, and personnel utilizing full-scale test specimens with actual (real) flaws. The same technology could prove of great benefit to industries other than nuclear, particularly for the fracture mechanics approach to fitness-for-purpose or lifetime-extension programs. This paper describes an approach to the design and fabrication of NDE test specimens with controlled flaws.

  10. Procedure for flaw detection in cast stainless steel

    DOE Patents [OSTI]

    Kupperman, David S. (Oak Park, IL)

    1988-01-01T23:59:59.000Z

    A method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic elements independent of the component thickness at the site; choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined and detecting flaws by use of the chosen technique.

  11. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Energy Savers [EERE]

    A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate...

  12. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  13. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  14. U-193: NetBSD System Call Return Value Validation Flaw Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to...

  15. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  16. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On systems with the 'AutoFill web forms' feature enabled, a remote...

  18. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Energy Savers [EERE]

    or modify SSLTLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch...

  19. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Environmental Management (EM)

    This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) attack and e.g. disclose potentially sensitive information. IMPACT: A remote user can spoof...

  20. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    Service Pack 1 ABSTRACT: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS sessions. reference LINKS: Microsoft Security Advisory (2588513)...

  1. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    HTC One Series, Sensation, Sensation XL, and possibly others; Motorola Droids, and Sony Ericsson Xperia series ABSTRACT: A vulnerability was reported in Google Android...

  4. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  5. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP...

  6. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specific TCP segments during the TCP connection termination phase. Appliances that are running versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they are configured...

  7. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

  8. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|Code |

  9. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote Users Execute

  10. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |RemoteDepartment

  11. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec

  12. V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |MicrosoftApple

  13. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department of

  14. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |DisclosureElevated

  15. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode | Department of

  16. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department

  17. V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivilegesUnauthorized Access | Department

  18. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThis documentEnergy(SHINES)FullThe

  19. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|

  20. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:|Department

  1. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability

  2. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July

  3. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy JulyUsers

  4. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |UsersSessions |

  5. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146AccessUsers

  6. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1

  7. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code |

  8. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary

  9. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department of

  10. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|Users Gain

  11. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment

  12. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  13. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment

  14. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|

  15. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1: Red

  16. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:UsersSpoof

  17. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:Energy|

  18. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at

  19. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment ofGain Elevated

  20. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary

  1. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThereDepartment of

  2. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment

  3. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixation Attacks |Elevated

  4. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixationofAuthenticationCode

  5. V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94:Vulnerabilities |UsersUsers Gain Root

  6. Angling chromium to let oxygen through | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Angling chromium to let oxygen through Angling chromium to let oxygen through Released: September 10, 2014 New semiconducting material works at lower temperatures Scanning...

  7. Development of a methodology for the assessment of shallow-flaw fracture in nuclear reactor pressure vessels: Generation of biaxial shallow-flaw fracture toughness data

    SciTech Connect (OSTI)

    McAfee, W.J.; Bass, B.R.; Bryson, J.W.

    1998-07-01T23:59:59.000Z

    A technology to determine shallow-flaw fracture toughness of reactor pressure vessel (RPV) steels is being developed for application to the safety assessment of RPVs containing postulated shallow-surface flaws. Shallow-flaw fracture toughness of RPV material has been shown to be higher than that for deep flaws, because of the relaxation of crack-tip constraint. This report describes the preliminary test results for a series of cruciform specimens with a uniform depth surface flaw. These specimens are all of the same size with the same depth flaw. Temperature and biaxial load ratio are the independent variables. These tests demonstrated that biaxial loading could have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for RPV materials. Through that temperature range, the effect of full biaxial (1:1) loading on uniaxial, shallow-flaw toughness varied from no effect near the lower shelf to a reduction of approximately 58% at higher temperatures.

  8. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex Applied Mathematics 121 -- Spring 2011 Due 5:00 PM, Friday, February 18 linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 2 2 Simplex

  9. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex AM121/ES121 -- Fall 2014 Due 5:00 PM, Tuesday, September 30, 2014 linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 3 2 Simplex

  10. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex Applied Mathematics 121 -- Spring 2014 Due 5:00 PM, Friday, February 21 practice solving linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 3 2

  11. Together Let Our Hearts Agree

    E-Print Network [OSTI]

    Ricketts, Clinton Michael

    2010-04-30T23:59:59.000Z

    . The communities I have been a part of offer a transient history described by communal hopes and important personal relationships. In retrospect, these relationships and shared desires define my sense of self. In the thesis exhibition titled Together Let Our Hearts...

  12. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  13. Effects of interfacial friction on flaw tolerant adhesion between two dissimilar elastic solids

    E-Print Network [OSTI]

    Yao, Haimin

    Flaw tolerance refers to a state in which a pre-existing crack-like flaw does not propagate even as the material is stretched to failure near its theoretical strength. Such an optimal scenario can be achieved when the ...

  14. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  15. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  16. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  17. Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds

    SciTech Connect (OSTI)

    GJ Schuster, FA Simonen, SR Doctor

    2008-04-01T23:59:59.000Z

    The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

  18. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  19. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  20. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, J.P.

    1987-06-23T23:59:59.000Z

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

  1. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, John P. (Sunnyvale, CA)

    1987-06-23T23:59:59.000Z

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

  2. Evaluation of outer flaws in titanium alloys using eddy current measuring system

    SciTech Connect (OSTI)

    Chady, T.; Psuj, G.; Kowalczyk, J. [Department of Electrical and Computer Engineering, West Pomeranian University of Technology in Szczecin, ul. Sikorskiego 37, 70-313 Szczecin (Poland)

    2011-06-23T23:59:59.000Z

    In this paper results of shallow outer flaw detection in thick titanium alloy specimens is presented. In order to increase efficiency of inspections of minor defects an eddy current measuring system with a lock-in amplifier was used. The measurements were carried out for flat and cylindrical specimens with artificial flaws.

  3. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012)

    E-Print Network [OSTI]

    Gerber, Edwin

    2012-01-01T23:59:59.000Z

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012) Published online in Wiley Online Library using National Centers for Environmental Prediction/National Center for Atmospheric Research (NCEP) concentrations and sea- surface temperatures (SSTs). These integrations enable the relative role of ozone

  4. Fabrication of specimens with controlled flaws for procedure development and personnel training and qualification

    SciTech Connect (OSTI)

    Edwards, R.L.; Watson, P.D.; Gruber, G.J. [Southwest Research Inst., San Antonio, TX (United States)

    1994-12-31T23:59:59.000Z

    Over the years, instances of service-induced flaws in vessel and piping components have prompted many utilities to acquire full-scale mockups to demonstrate the performance of nondestructive evaluation (NDE) procedures. Also, the newly invoked Appendix 8 requirement to the 1989 Section 11 ASME Code requires qualification of equipment, procedures, and personnel utilizing full-scale test specimens with actual flaws. This has increased the need for flaws that can be produced and accurately controlled in various test specimens. The typical service-induced flaws may consist of one of the following, depending on the material type and service conditions: mechanical fatigue; thermal fatigue; intergranular stress-corrosion (IGSC) cracking; and weld-induced flaws (during manufacture) such as slag, porosity, or incomplete fusion.

  5. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...

    Broader source: Energy.gov (indexed) [DOE]

    Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

  6. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  7. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  8. U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

  9. U-094: EMC Documentum Content Server Lets Local Administrative...

    Broader source: Energy.gov (indexed) [DOE]

    4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

  10. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri Global Energy LLCEnergy) Redirect page JumpCorpUniversity

  11. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Broader source: Energy.gov (indexed) [DOE]

    BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions...

  12. First, let's recall We call this ratio

    E-Print Network [OSTI]

    ) For z Phase accumulated from z=0 to z=d Let's evaluate the phase-change and Ey COME OUT from the birefringent material OUT OF PHASE In PHASE #12;For z >d To find an expression for the fields in the region z>d, all we have to do it to account for the accumulated change of phase from z=0

  13. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013)

    E-Print Network [OSTI]

    Lee, Sukyoung

    2013-01-01T23:59:59.000Z

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013) Published online in Wiley Online Library Sciences, Seoul National University, Seoul, South Korea *Correspondence to: C. Yoo, Center for Atmosphere). A number of studies have shown that the MJO plays an important role in modulating the extratropical cir

  14. Reconstruction of Flaw Profiles Using Neural Networks and Multi-Frequency Eddy Current System

    SciTech Connect (OSTI)

    Chady, T.; Caryk, M. [Technical University of Szczecin, al. Piastow 19, 70-310 Szczecin (Poland)

    2005-04-09T23:59:59.000Z

    The objective of this paper is to identify profiles of flaws in conducting plates. To solve this problem, application of a multi-frequency eddy current system (MFES) and artificial neural networks is proposed. Dynamic feed-forward neural networks with various architectures are investigated. Extended experiments with all neural models are carried out in order to select the most promising configuration. Data utilized for the experiments were obtained from the measurements performed on the Inconel plates with EDM flaws.

  15. Effects of flaws on fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Singh, J.P.; Singh, D.; Sutaria, M.

    1996-05-01T23:59:59.000Z

    We evaluated the effects of fiber coating thickness, fiber orientation, and elevated temperature on flaw morphology and mechanical properties of Nicalon-fiber-reinforced SiC matrix composites with fiber cloth lay-up sequences of 0{degree}/45{degrees}, 0{degree}/20{degrees}/60{degrees}, and 0{degree}/40{degrees}/60{degrees} and fiber coating thicknesses of 0. 2 and 0.4{mu}m. For the three fiber cloth lay-up sequences (0{degree}/45{degrees}, 0{degree}/20{degrees}/60{degrees}, and 0{degree}/40{degrees}/60{degrees}), mechanical property (first matrix cracking stress, ultimate stress, and work of fracture) initially increase with coating thickness and reach peak values at a coating thickness of 0.2{mu}m. A further increase in coating thickness does not result in further improvements in mechanical properties; this is related to the role of coatings in protecting fibers from damage during composite processing. Measured values of strength and work-of- fracture of the above composites at elevated temperatures increased with temperature up to 1200{degrees}C, but decreased at higher temperatures. This decrease is correlated to in-situ fiber strength and fiber/matrix interface degradation. Correlations between model prediction and measured room-temperature ultimate strength of composites with 0{degree}45{degrees} and 0{degree}/40{degrees}/60{degrees} lay-up sequences were established by using in-situ fiber strength characteristics. The failure modes and degradation mechanisms in hot-gas filters and ceramic composite joints are being characterized by the mechanical and fractographic evaluation techniques established thus far. Correlations of these results with those of nondestructive evaluation can provide critical information for improved quality control.

  16. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  17. Solar Decathlon 2013: Let the Building Begin | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During...

  18. Technical Letter Report Development of Flaw Size Distribution Tables Including Effects of Flaw Depth Sizing Errors for Draft 10CFR 50.61a (Alternate PTS Rule) JCN-N6398, Task 4

    SciTech Connect (OSTI)

    Simonen, Fredric A.; Gosselin, Stephen R.; Doctor, Steven R.

    2013-04-22T23:59:59.000Z

    This document describes a new method to determine whether the flaws in a particular reactor pressure vessel are consistent with the assumptions regarding the number and sizes of flaws used in the analyses that formed the technical justification basis for the new voluntary alternative Pressurized Thermal Shock (PTS) rule (Draft 10 CFR 50.61a). The new methodology addresses concerns regarding prior methodology because ASME Code Section XI examinations do not detect all fabrication flaws, they have higher detection performance for some flaw types, and there are flaw sizing errors always present (e.g., significant oversizing of small flaws and systematic under sizing of larger flaws). The new methodology allows direct comparison of ASME Code Section XI examination results with values in the PTS draft rule Tables 2 and 3 in order to determine if the number and sizes of flaws detected by an ASME Code Section XI examination are consistent with those assumed in the probabilistic fracture mechanics calculations performed in support of the development of 10 CFR 50.61a.

  19. EDDY CURRENT TESTING OF FERROMAGNETIC MATERIALS: MODELLING OF MULTIPLE FLAWS IN A

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    EDDY CURRENT TESTING OF FERROMAGNETIC MATERIALS: MODELLING OF MULTIPLE FLAWS IN A PLANAR STRATIFIED ­ Université Paris Sud 11), 3, rue Joliot-Curie, 91192 Gif-sur- Yvette, France ! "#$%&'(%! Eddy current testing. Lambert, H. Voillaume and N. Dominguez, "A 3D model for eddy current inspection in aeronautics

  20. Ryan Naraine, Eweek, 2004.11.11: "XP SP2 flaw warning sparks debate on

    E-Print Network [OSTI]

    Bernstein, Daniel

    system. "San Jose, Calif.-based Finjan Software released an alert warning that attackers could `silently warning is overblown. " `Our early analysis indicates that Finjan's claims are potentially misleadingRyan Naraine, Eweek, 2004.11.11: "XP SP2 flaw warning sparks debate on disclosure "The debate over

  1. Physical Model Assisted Probability of Detection in Nondestructive Evaluation for Detecting of Flaws in Titanium

    E-Print Network [OSTI]

    of Flaws in Titanium Forgings Ming Li and William Q. Meeker Department of Statistics and Center testing inspection methods to detect synthetic hard alpha inclusion defects in titanium forging disks. Key, Mixed effects, Titanium forging, Ultrasonic testing. 1 INTRODUCTION 1.1 Background Nondestructive

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  3. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  4. Improved multi-directional eddy current inspection test apparatus for detecting flaws in metal articles

    DOE Patents [OSTI]

    Nance, Roy A. (McMurray, PA); Hartley, William H. (Pittsburgh, PA); Caffarel, Alfred J. (Pittsburgh, PA)

    1984-01-01T23:59:59.000Z

    Apparatus is described for detecting flaws in a tubular workpiece in a single scan. The coils of a dual coil bobbin eddy current inspection probe are wound at a 45.degree. angle to the transverse axis of the probe, one coil having an angular position about the axis about 90.degree. relative to the angular position of the other coil, and the angle of intersection of the planes containing the coils being about 60.degree..

  5. One-sided infrared thermal imaging for flaw characterization of ceramic matrix composites

    SciTech Connect (OSTI)

    Deemer, C.; Sun, J. G.; Ellingson, W. A.

    2000-05-16T23:59:59.000Z

    One-sided infrared thermal imaging is being used to characterize voids and delamination in SiC/SiC composites. Flaw depth is estimated by examining the decay of surface temperature after application of a thermal pulse. Digital analysis of the surface temperature/time relationship allows characterization of the sizes and positions of defects. Results show that defects of various sizes and depths can be characterized in SiC/SiC composites with the technique.

  6. Apparatus for the control of self-propelled gamma-flaw detector

    SciTech Connect (OSTI)

    Kulekov, S.I.; Pavlov, A.S.

    1981-08-11T23:59:59.000Z

    A self-propelled device movable inside a pipeline for the radiographic detection of flaws in its weld joints comprises a reversible drive motor and a normally deactivated radiation emitter. Logical circuitry aboard the device, including a twostage memory, enables the selective energization of the drive motor and the activation of the radiation emitter during standstill in response to command pulses of different duration transmitted from an external radiation source through the pipeline wall and intercepted by one of two sensors.

  7. Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

    2012-06-01T23:59:59.000Z

    During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

  8. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  9. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  10. LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    /kWh, depending on its location as well as on the size and type of PV system used (EPIA Report, 2011). InvestmentLET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI Jérôme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany

  11. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  12. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  13. U-178: VMware vMA Library Loading Error Lets Local Users Gain...

    Broader source: Energy.gov (indexed) [DOE]

    Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges...

  14. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  15. Development of flaw accept/reject criteria for solid propellant rocket grains

    E-Print Network [OSTI]

    Rotter, James Jerome

    1976-01-01T23:59:59.000Z

    centerbore sur face (See Figure 1, p. 7) E c f(c/a) G c h(g/c ) 1c L Tensile modulus of propellant . ensile (hoop) modulus of case Crack depth/inner bore radius correction factor Strain energy release rate Critical strain energy release rate Case...) Pres. ure Parr f actor Radius to centerbore crack tip (a + c) Xlv LIST OF SYMBOLS (continued) Temperature Time Internal strain energy Web thickness (b - a) Distance of flaw from forward end of grain (See Figure 1, p, P) Propellant coefficient...

  16. FLI-1 Flightless-1 and LET-60 Ras control germ line morphogenesis in C. elegans

    E-Print Network [OSTI]

    Lu, Jiamiao; Dentler, William L., Jr; Lundquist, Erik A.

    2008-05-16T23:59:59.000Z

    for the germ line morphogenesis defect by DIC optics and DAPI staining (Figure 11A) [30,32,33]. The hypomorphic loss-of-function allele n2021 caused a ky535-like germ line defect in 44% of gonad arms, and the stronger let-60 loss-of-function alleles s1124, s...1045), let-23(sy10), lin-31(n301). LGIII: fli-1(ky535), fli-1(tm362), tnIs6 [plim-7::gfp], dpy- 17(e164), unc-32(e189), mpk-1(ku1), eT1. LGIV: let- 60(n2021), let-60(s1124), let-60(s1155), let-60(s59), let- 60(sy93), let-60(sy92), let-60(sy99), let-60(n...

  17. IEEE TRANSACTIONS ON MAGNETICS, VOL. 35, NO. 3, MAY 1999 1873 Flaws Characterization with Pulsed Eddy Currents N.D.T.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Eddy Currents N.D.T. T.Clauzon, F.Thollon, A. Nicolas. C.E.G.E.L.Y-UPRESAC.N.R.S5005-Ecole Centrale de the impulseresponsegives an estimationof the dimensionsof the flaw. Index terms- Eddy current testing, flaw to the filler, ultrasounds do not give results. So pulsed eddy current N.D.T has to be used. Characterization

  18. To appear in The International Journal of Intelligent Automation and Soft Computing, 2003 Detection of Welding Flaws with MLP Neural Network and Case Based Reasoning

    E-Print Network [OSTI]

    Triantaphyllou, Evangelos

    Detection of Welding Flaws with MLP Neural Network and Case Based Reasoning T. Warren Liao1 *, E-Ze University, Nei-Li 32026, Chung-Li, Taiwan Abstract - The correct detection of welding flaws is important to the successful development of an automated weld inspection system. As a continuation of our previous efforts

  19. Advanced Calculus 2 1. The derivative: Let Rm

    E-Print Network [OSTI]

    Logan, David

    , . . . , m). (9) We assume the transformation (9) to be invertible, that is, we can for the xj as functionsAdvanced Calculus 2 1. The derivative: Let Rm have components j and x: Rm Rn by x() = x1 matrix. You can think of A as a linear function taking Rm to Rm . We denote by AB the image of B under A

  20. Fatigue flaw growth assessment and inclusion of stratification to the LBB assessment

    SciTech Connect (OSTI)

    Samohyl, P.

    1997-04-01T23:59:59.000Z

    The application of the LBB requires also fatigue flaw growth assessment. This analysis was performed for PWR nuclear power plants types VVER 440/230, VVER 440/213c, VVER 1000/320. Respecting that these NPP`s were designed according to Russian codes that differ from US codes it was needed to compare these approaches. Comparison with our experimental data was accomplished, too. Margins of applicability of the US methods and their modifications for the materials used for construction of Czech and Slovak NPP`s are shown. Computer code accomplishing the analysis according to described method is presented. Some measurement and calculations show that thermal stratifications in horizontal pipelines can lead to additive loads that are not negligible and can be dangerous. An attempt to include these loads induced by steady-state stratification was made.

  1. Eddy-current probe impedance due to a volumetric flaw J. R. Bowler and S. A. Jenkins

    E-Print Network [OSTI]

    Bowler, John R.

    Eddy-current probe impedance due to a volumetric flaw J. R. Bowler and S. A. Jenkins University 25 January 1991) Eddy current induced in a metal by a coil carrying an alternating current may, or inclusions. In eddy-current nondestructive evaluation, defectsare commonly sensedby a change of the coil

  2. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Broader source: Energy.gov (indexed) [DOE]

    data CVE-2013-3813 A remote user can exploit a flaw in the UtilityRemote Execution Server(in.rexecd) component to partially access data CVE-2013-0398 A remote user can...

  3. Fracture assessment of HSST Plate 14 shallow-flaw cruciform bend specimens tested under biaxial loading conditions

    SciTech Connect (OSTI)

    Bass, B.R.; McAfee, W.J.; Williams, P.T.; Pennell, W.E.

    1998-06-01T23:59:59.000Z

    A technology to determine shallow-flaw fracture toughness of reactor pressure vessel (RPV) steels is being developed for application to the safety assessment of RPVs containing postulated shallow surface flaws. Matrices of cruciform beam tests were developed to investigate and quantify the effects of temperature, biaxial loading, and specimen size on fracture initiation toughness of two-dimensional (constant depth), shallow, surface flaws. The cruciform beam specimens were developed at Oak Ridge National Laboratory (ORNL) to introduce a far-field, out-of-plane biaxial stress component in the test section that approximates the nonlinear stresses resulting from pressurized-thermal-shock or pressure-temperature loading of an RPV. Tests were conducted under biaxial load ratios ranging from uniaxial to equibiaxial. These tests demonstrated that biaxial loading can have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for an RPV material. The cruciform fracture toughness data were used to evaluate fracture methodologies for predicting the observed effects of biaxial loading on shallow-flaw fracture toughness. Initial emphasis was placed on assessment of stress-based methodologies, namely, the J-Q formulation, the Dodds-Anderson toughness scaling model, and the Weibull approach. Applications of these methodologies based on the hydrostatic stress fracture criterion indicated an effect of loading-biaxiality on fracture toughness; the conventional maximum principal stress criterion indicated no effect. A three-parameter Weibull model based on the hydrostatic stress criterion is shown to correlate the experimentally observed biaxial effect on cleavage fracture toughness by providing a scaling mechanism between uniaxial and biaxial loading states.

  4. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following...

  5. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code...

  6. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  7. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Energy Savers [EERE]

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

  8. U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: OpenSSL Invalid TLSDTLS Record Processing Lets Remote Users Deny Service U-167: OpenSSL Invalid TLSDTLS Record Processing Lets Remote Users Deny Service May 11, 2012 - 7:00am...

  9. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  10. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A...

  11. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  12. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...

    Broader source: Energy.gov (indexed) [DOE]

    11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

  13. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  14. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w| n. Then x, y, z s.t. the following all hold: xyz = w |xy| n |y| > 0, and k 0 (xykz L(D)) L30: Pumping Lemma CS250: Discrete Math for Computer Science #12;proof: Let w L(D), |w| n, w = w1, w2

  15. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Immerman, Neil

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w| n. Then x, y, z s.t. the following all hold: xyz = w |xy| n |y| > 0, and k 0 (xykz L(D)) Pumping Lemma for Regular Sets #12;proof: Let w L(D), |w| n, w = w1, w2, . . . , wn · u w = w1 w2 w3

  16. Effects of high-temperature environments on flaw generation and fracture behavior of SiC/SiC composites

    SciTech Connect (OSTI)

    Singh, J.P.; Singh, D. [Argonne National Lab., IL (United States). Energy Technology Div.

    1995-02-01T23:59:59.000Z

    Flaw generation and fracture behavior of Nicalon-fiber-reinforced SiC matrix composites are influenced by high temperatures. Therefore, the authors evaluated the effects of temperature by measuring the strength of these composites at several temperatures ranging from 800 to 1,300 C, and by characterizing their microstructure. While composite strength increased from {approx}400 MPa at room temperature to {approx}532 MPa at 800 C, it decreased to {approx}270 MPa at 1,300 C. Such degradation of composite strength at high temperature is believed to be partly due to fiber degradation. In-situ fiber strength of composites tested at room and elevated temperatures was estimated by fractographic techniques. The in-situ strength of fibers in composites was significantly lower than that of as-received fibers. This decrease is believed to be related to flaws that develop during processing and to exposure to elevated-temperature service environments.

  17. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States); Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O. [Tribolet (R.O.), Van Wert, OH (United States)

    1997-11-01T23:59:59.000Z

    High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

  18. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States). Process and Systems R and D; Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O.

    1996-12-01T23:59:59.000Z

    High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

  19. Dilatation-strain analysis of the effects of flaws on the mechanical behavior of a highly filled elastomer

    E-Print Network [OSTI]

    Smith, Benjamin Ray

    1966-01-01T23:59:59.000Z

    as to style and content by: (Chairman of Committee) (Head of Department) (Member) August 1966 460008 ABSTRACT Dilatation-Strain Analysis of the Effects of Flaws on the Mechanical Behavior of a Highly Filled Elastomer Benjamin Ray Smith, B. S. , Texas... and from plates of solid propellant milled to 0. 250 inches in thick- ness. These materials were supplied by the Rocketdyne Division of North American Aviation. Their designation for the propellant is RDS-500. Their properties, which were found in other...

  20. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote...

  1. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE's Nuclear EnergySmart Meters and| Department of: Let the

  2. A Proposal for the Maximum KIC for Use in ASME Code Flaw and Fracture Toughness Evaluations

    SciTech Connect (OSTI)

    Kirk, Mark [NRC; Stevens, Gary [U.S. Nuclear Regulatory Commission; Erickson, Marjorie A [ORNL; Yin, Shengjun [ORNL

    2011-01-01T23:59:59.000Z

    Nonmandatory Appendices A [1] and G [2] of Section XI of the ASME Code use the KIc curve (indexed to the material reference transition temperature, RTNDT) in reactor pressure vessel (RPV) flaw evaluations, and for the purpose of establishing RPV pressure-temperature (P-T) limits. Neither of these appendices places an upper-limit on the KIc value that may be used in these assessments. Over the years, it has often been suggested by some of the members of the ASME Section XI Code committees that are responsible for maintaining Appendices A and G that there is a practical upper limit of 200 ksi in (220 MPa m) [4]. This upper limit is not well recognized by all users of the ASME Code, is not explicitly documented within the Code itself, and the one source known to the authors where it is defended [4] relies on data that is either in error, or is less than 220 MPa m. However, as part of the NRC/industry pressurized thermal shock (PTS) re-evaluation effort, empirical models were developed that propose common temperature dependencies for all ferritic steels operating on the upper shelf. These models relate the fracture toughness properties in the transition regime to those on the upper shelf and, combined with data for a wide variety of RPV steels and welds on which they are based, suggest that the practical upper limit of 220 MPa m exceeds the upper shelf fracture toughness of most RPV steels by a considerable amount, especially for irradiated steels. In this paper, available models and data are used to propose upper bound limits of applicability on the KIc curve for use in ASME Code, Section XI, Nonmandatory Appendices A and G evaluations that are consistent with available data for RPV steels.

  3. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  4. Assessment of strength limiting flaws in ceramic heat exchanger components: Phase 1, Final report, September 28, 1984-June 30, 1986

    SciTech Connect (OSTI)

    Powers, T.; Snyder, J.

    1986-10-01T23:59:59.000Z

    Assurance of energy efficient design lifetimes of high temperature structural ceramics requires the ability to specify acceptance criteria and to test to those criteria. These criteria will be established through nondestructive testing, to determine which defects are detectable, together with fracture mechanics, to calculate effects of indetectable flaws. The first phase of this program is to examine heat exchanger material with four test methods which have shown promise for use in ceramics; ultrasonic scanning, microfocus x-ray, Scanning Laser Acoustic Microscope, and Acoustic Holography. The capabilities, limits, and potential for improvement of these are presented in this report. Destructive testing, material sectioning, and fractography are included. 24 refs., 68 figs., 6 tabs.

  5. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in Apache. A remote user can access internal servers. PLATFORM: Apache HTTP Server Service ABSTRACT: Apache modproxymodrewrite Bug Lets Remote Users Access Internal...

  6. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  7. Electromagnetic methods for measuring materials properties of cylindrical rods and array probes for rapid flaw inspection

    SciTech Connect (OSTI)

    Sun, Haiyan

    2005-05-01T23:59:59.000Z

    The case-hardening process modifies the near-surface permeability and conductivity of steel, as can be observed through changes in alternating current potential drop (ACPD) along a rod. In order to evaluate case depth of case hardened steel rods, analytical expressions are derived for the alternating current potential drop on the surface of a homogeneous rod, a two-layered and a three-layered rod. The case-hardened rod is first modeled by a two-layer rod that has a homogeneous substrate with a single, uniformly thick, homogeneous surface layer, in which the conductivity and permeability values differ from those in the substrate. By fitting model results to multi-frequency ACPD experimental data, estimates of conductivity, permeability and case depth are found. Although the estimated case depth by the two-layer model is in reasonable agreement with the effective case depth from the hardness profile, it is consistently higher than the effective case depth. This led to the development of the three-layer model. It is anticipated that the new three-layered model will improve the results and thus makes the ACPD method a novel technique in nondestructive measurement of case depth. Another way to evaluate case depth of a case hardened steel rod is to use induction coils. Integral form solutions for an infinite rod encircled by a coaxial coil are well known, but for a finite length conductor, additional boundary conditions must be satisfied at the ends. In this work, calculations of eddy currents are performed for a two-layer conducting rod of finite length excited by a coaxial circular coil carrying an alternating current. The solution is found using the truncated region eigenfunction expansion (TREE) method. By truncating the solution region to a finite length in the axial direction, the magnetic vector potential can be expressed as a series expansion of orthogonal eigenfunctions instead of as a Fourier integral. Closed-form expressions are derived for the electromagnetic field in the presence of a finite a two-layer rod and a conductive tube. The results are in very good agreement with those obtained by using a 2D finite element code. In the third part, a new probe technology with enhanced flaw detection capability is described. The new probe can reduce inspection time through the use of multiple Hall sensors. A prototype Hall array probe has been built and tested with eight individual Hall sensor ICs and a racetrack coil. Electronic hardware was developed to interface the probes to an oscilloscope or an eddy current instrument. To achieve high spatial resolution and to limit the overall probe size, high-sensitivity Hall sensor arrays were fabricated directly on a wafer using photolithographic techniques and then mounted in their unencapsulated form. The electronic hardware was then updated to interface the new probes to a laptop computer.

  8. Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1

    E-Print Network [OSTI]

    of the radiobiological effects of high- linear energy transfer (LET) radiation is essential for radiation protectionGenomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1 and Tom K, it has always been accepted that the deleterious effects of ionizing radiation, such as mutation

  9. Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1

    E-Print Network [OSTI]

    Harbater, David

    Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1 C be a G-Galois branched cover, with branch locus P1, . . ., Pr, where Pj is at x = j. Let P be a base point on the positive imaginary axis. Choose a homotopy basis 1, . . ., r of counterclockwise loops at P, where j winds once around Pj

  10. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15T23:59:59.000Z

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  11. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  12. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host T-589: Citrix XenApp and Citrix Presentation Server Bug...

  13. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers....

  14. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  15. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome....

  16. An extension of Markov's Inequality Let E be a connected compact ...

    E-Print Network [OSTI]

    An extension of Markov's Inequality. Let E be a connected compact set of logarithmic capacity 1 in the complex. plane. Is it true that for every polynomial P of ...

  17. THE C*-ALGEBRA OF A VECTOR BUNDLE 1. Introduction Let E ...

    E-Print Network [OSTI]

    2010-07-19T23:59:59.000Z

    Jul 19, 2010 ... If B/J is nuclear then it is C(X)-nuclear and since CJ is KKX-contractible it follows that µ must be a KKX-equivalence, see [2]. Let us recall that ...

  18. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  19. Let A be any language. Define the right-equivalence relation A on

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    = {a, b}; A1 = w #b(w) 0 (mod 2) L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b(w) 0 (mod 2) A1 a b A1 ab L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b

  20. Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels

    SciTech Connect (OSTI)

    Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

    1991-10-01T23:59:59.000Z

    This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

  1. Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

    2014-03-24T23:59:59.000Z

    PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industry’s Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

  2. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

    1999-07-20T23:59:59.000Z

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

  3. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, Janda K. (Sandia Park, NM); Reed, Scott T. (Albuquerque, NM); Ashley, Carol S. (Albuquerque, NM); Neiser, Richard A. (Albuquerque, NM); Moffatt, William C. (Albuquerque, NM)

    1999-01-01T23:59:59.000Z

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties.

  4. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBMand LocalDepartmentAccountFlaw

  5. A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

    2014-04-07T23:59:59.000Z

    A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

  6. 1.Let a 2 and w 2 *. Define w.num(a) = the number of a's in w. Let = {b, c* *, d, e, f}.

    E-Print Network [OSTI]

    Cappello, Peter

    }. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. * *Prove that L. Let L 2 *. Define h-1(L), read "h inverse of L," is the set of strings w 2 * * * such that h(w) 2. Construct an auto* *maton that recognizes h-1(L) as follows. On input w, the automaton, for each symbol

  7. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Sivers, E.A. [and others

    1995-04-01T23:59:59.000Z

    Continuous fiber ceramic matrix composites are being developed for turbine engine components, heat exchangers, and hot-gas filters in fossil energy systems. Reliable application requires nondestructive evaluation (NDE) methods that provide data for quality assurance and inputs to life time prediction models and that aid in process development. NDE developments at Argonne have focused on methods to assess density distribution, fiber orientation (for mechanical properties), and defect detection in both SiC/SiC and A1{sub 2}O{sub 3}/A1{sub 2}O{sub 3} materials. and that also assess the chemical state at fiber/matrix interfaces. 2-D cloth lay-up and 3-D weave CVI-infiltrated SiC/SiC specimens were studied by X-ray imaging methods now under development. Microfocus X-ray computerized tomography (MXCT) methods are being developed to provide these data. Multinuclear Nuclear Magnetic Resonance spectroscopy (13C, 29Si, and 11B) is under development for quantizing B content at fiber/matrix interfaces. Magic angle spinning techniques on SiC/SiC specimens with different coating thicknesses showed that quantification of B at the Interface is achievable. NDE data are being coupled to room- and elevated-temperature fracture studies to evaluate effects of fiber orientation and fiber coating thickness on resulting flaw morphology and mechanical properties of Nicalon-fiber-reinforced SiC matrix composites. Specifically, composites with fiber cloth lay-up sequences of varying coating thicknesses were evaluated. For room-temperature mechanical evaluation, composites with carbon-fiber coating thicknesses of 0 and 0.2 {mu}m were used, while elevated-temperature studies used composites with a coating thickness of 0.4 {mu}m. Composites with uncoated fibers failed in a brittle mode, while composites with 0.2 {mu}m fiber coating showed noncatastrophic failure.

  8. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.

    1993-03-01T23:59:59.000Z

    Work emphasized continuous-fiber ceramic matrix composites (CFCCs) with 2-D lay-ups composed of chemical-vapor-infiltrated (CVI) SiC/SiC materials, mostly made of Nicalon plain weave with 16 [times] 16 tows/in. One sample examined comprised a 3-D SiC/SiC braid made by Techniweave. Using a new 1024[times]1024[times]14 bit detector, images from 3-D X-ray CT data with pixel sizes of <140 [mu]m and 2-D fast-Fourier transform (FFT) image processing, we have shown that fiber orientations can be measured to [plus minus]2-1/2[degree]. 3-D FFT analysis was used to determine 3-D braid/weave fiber spacing. Multinuclear ([sup l]H, [sup 13]C, and [sup 29]Si) NMR spectroscopy, is being studied. Surface chemistry of fibers and chemistry of interfacial regions in composites are being studied. We are also conducting initial studies to investigate the bulk composition of matrix materials ([alpha], [beta], amorphous phase, silica, and oxynitride concentration) and surface chemistry of Si[sub 3]N[sub 4] and SiC fibers. Fracture mechanics work to correlate with NDE data focused on strength distribution of as-fabricated Nicalon fibers obtained from bundle tests. Strength distribution of fractured Nicalon fibers in composites was assessed from fracture mirror radii. SEM was used to determine distribution of fiber pullout length distribution for fibers in composites, for their strength distribution. From the strength distribution plots, scale parameters were determined to be 3.45 GPa for as-fabricated fibers and 1.31 GPa for fibers in processed composites. However, the Weibull moduli for the two distributions were similar. Reduction in strength of the fibers in processed composites is believed to be due to surface flaws and defects. Effects of fiber misorientation on mechanical properties of NDE-tested CVI continuous-fiber composites are currently being investigated. 8 figs, 11 refs.

  9. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web...

  10. Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain

    E-Print Network [OSTI]

    Subramanian, Sriram

    Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain Tuesday, 12 July 2011 #12@cs.nott.ac.uk christian.olms@stud.uni-due.de jonhaber@gmail.com kasia.warpas@gmail.com Tuesday, 12 July 2011 #12;

  11. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote...

  12. WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program

    E-Print Network [OSTI]

    Virginia Tech

    WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program Fidelity Investments innovation, and effective deployment of leading-edge technologies. Our entry-level technology training, Quality Assurance, Mainframe Development and Technology Infrastructure and Engineering (TIE). Upon

  13. Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims

    E-Print Network [OSTI]

    Schwartz, Andrew

    Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims successfully wired monkey brains to robot arms, raising hope that science is moving closer to finding ways to help paralyzed people control their world. Using their brains to control their robot arms, monkeys

  14. How Plants Grow name______________ Plants can grow from more than just seeds. Let's look at

    E-Print Network [OSTI]

    Koptur, Suzanne

    How Plants Grow name______________ Plants can grow from more than just seeds. Let's look at some of these ways you can grow plants. CUTTINGS Many plants can be started from cuttings (pieces of a bigger plant). A good place to make a cutting is fromone of the growing points of the plant (stem-tip). Some plants like

  15. Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity

    E-Print Network [OSTI]

    Simmons, Craig A.

    Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity Peter F. Davies, Anthony G. Passerini, Craig A. Simmons A ortic valve diseases are debilitating cardiovascular disorders the longevity of replacement valves and to improve tissue engineered substitutes,1 the underlying mech- anisms

  16. Energy Policy 33 (2005) 18251832 Letting the (energy) Gini out of the bottle: Lorenz curves of

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Energy Policy 33 (2005) 1825­1832 Letting the (energy) Gini out of the bottle: Lorenz curves of cumulative electricity consumption and Gini coefficients as metrics of energy distribution and equity Arne Jacobsona , Anita D. Milmana , Daniel M. Kammena,b, * a Energy and Resources Group, University of California

  17. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  18. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  19. Aneuploidy: Cancer's Fatal Flaw?

    E-Print Network [OSTI]

    Williams, Bret R.

    Aneuploidy is a characteristic of cancer, with greater than 90% of all solid tumors in humans carrying an aberrant karyotype. Yet, whether or how this condition contributes to tumorigenesis is not understood. Here we ...

  20. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code...

  1. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.

    1993-03-01T23:59:59.000Z

    Work emphasized continuous-fiber ceramic matrix composites (CFCCs) with 2-D lay-ups composed of chemical-vapor-infiltrated (CVI) SiC/SiC materials, mostly made of Nicalon plain weave with 16 {times} 16 tows/in. One sample examined comprised a 3-D SiC/SiC braid made by Techniweave. Using a new 1024{times}1024{times}14 bit detector, images from 3-D X-ray CT data with pixel sizes of <140 {mu}m and 2-D fast-Fourier transform (FFT) image processing, we have shown that fiber orientations can be measured to {plus_minus}2-1/2{degree}. 3-D FFT analysis was used to determine 3-D braid/weave fiber spacing. Multinuclear ({sup l}H, {sup 13}C, and {sup 29}Si) NMR spectroscopy, is being studied. Surface chemistry of fibers and chemistry of interfacial regions in composites are being studied. We are also conducting initial studies to investigate the bulk composition of matrix materials ({alpha}, {beta}, amorphous phase, silica, and oxynitride concentration) and surface chemistry of Si{sub 3}N{sub 4} and SiC fibers. Fracture mechanics work to correlate with NDE data focused on strength distribution of as-fabricated Nicalon fibers obtained from bundle tests. Strength distribution of fractured Nicalon fibers in composites was assessed from fracture mirror radii. SEM was used to determine distribution of fiber pullout length distribution for fibers in composites, for their strength distribution. From the strength distribution plots, scale parameters were determined to be 3.45 GPa for as-fabricated fibers and 1.31 GPa for fibers in processed composites. However, the Weibull moduli for the two distributions were similar. Reduction in strength of the fibers in processed composites is believed to be due to surface flaws and defects. Effects of fiber misorientation on mechanical properties of NDE-tested CVI continuous-fiber composites are currently being investigated. 8 figs, 11 refs.

  2. Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators at the West Haymarket Joint Public Agency. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    SciTech Connect (OSTI)

    Roberts, J. O.; Mosey, G.

    2013-08-01T23:59:59.000Z

    Fatal flaw analysis of utility-scale wind turbines at the West Haymarket Joint Public Agency brownfields site in Lincoln, Nebraska, funded by EPA.

  3. Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may or may not

    E-Print Network [OSTI]

    Green, Richard M.

    Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may) transitive. #12;Math 2001 page 2 of 5 2. (20) Let A be the 3-element set {Rock, Paper, Scissors}, and let R) Write down the inverse relation, R-1 , on A. #12;Math 2001 page 3 of 5 3. (30) Let B = {1, 2, 3

  4. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  5. Summary of meeting on disposal of LET&D HEPA filters

    SciTech Connect (OSTI)

    Not Available

    1991-11-21T23:59:59.000Z

    This report is a compilation of correspondence between Westinghouse Idaho Nuclear Company and the US EPA over a period of time from 1988 to 1992 (most from 1991-92) regarding waste management compliance with EPA regulations. Typical subjects include: compliance with satellite accumulation requirements; usage of ``Sure Shot`` containers in place of aerosol cans; notice of upcoming recyclable battery shipments; disposition of batteries; HEPA filter leach sampling and permit impacts; functional and operation requirements for the spent filter handling system; summary of meeting on disposal of LET and D HEPA filters; solvent substitution database report; and mercury vapor light analytical testing.

  6. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count the ways. We've built programs that

  7. U-033: Microsoft Security Bulletin Summary for November 2011...

    Broader source: Energy.gov (indexed) [DOE]

    are available from Microsoft Update. Addthis Related Articles T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions U-074: Microsoft .NET Bugs Let...

  8. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  9. Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A =

    E-Print Network [OSTI]

    Bohner, Martin

    Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A = a b b c . Show by f(x, y, z) = (x2 +2y2 )e-(x2+y2) +zez . 147. In order to produce a box we have two materials

  10. Bianchi Orbifolds of Small Discriminant Let OD be the ring of integers in the imaginary quadratic field Q(

    E-Print Network [OSTI]

    Hatcher, Allen

    Bianchi Orbifolds of Small Discriminant A. Hatcher Let OD be the ring of integers in the imaginary quadratic field Q( D) of discrim- inant D OD) is a discrete subgroup of the isometry group PSL2(C) (= PGL2(C)) of hyperbolic 3-space H3 . The quotient space H3 /PGL2(OD) = XD is topologically

  11. Don't let the river run dry: Efficiency and conservation efforts in the Rio Grande Basin

    E-Print Network [OSTI]

    Supercinski, Danielle

    2011-01-01T23:59:59.000Z

    and quality of water for this region. For further information, materials, and articles about RGBI, visit riogrande.tamu.edu. Don?t let the river run dry, continued ... conservation; (6) environment, ecology, and water quality protection; (7) saline and wastewater management and reuse; (8) basinwide hydrology, salinity modeling, and technology; and (9) communica- tions and accountability. ?A major strength of the Rio...

  12. Partial Solutions for Assignment 1 (1) In a certain random experiment, let A and B be two events such that P(A) = 0.7,

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    of the slots in which the ball falls. (a) The sample space S = {1, 2, · · ·, 35, 36, 0, 00}. (b) Let B = {0, 00) A box contains four marbles numbered 1 through 4. The marbles are selected one at a time without replacement. A match occurs if marble numbered k is the kth marble selected. Let the event Ai, denote a match

  13. 1. Let a and w . Define w.num(a) = the number of a's in w. Let = {b, c, d, e, f}. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. Prove

    E-Print Network [OSTI]

    Cappello, Peter

    1. Let a and w . Define w.num(a) = the number of a's in w. Let = {b, c, d, e, f}. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. Prove that L is regular or prove that L() = , for the empty word . That is, we apply h to each symbol of w and concatenate the results, in order. Let L

  14. Lack of Bystander Effects From High LET Radiation For Early Cytogenetic Endpoints.

    SciTech Connect (OSTI)

    Groesser, Torsten; Cooper, Brian; Rydberg, Bjorn

    2008-05-07T23:59:59.000Z

    The aim of this work was to study radiation-induced bystander effects for early cytogenetic end points in various cell lines using the medium transfer technique after exposure to high- and low-LET radiation. Cells were exposed to 20 MeV/ nucleon nitrogen ions, 968 MeV/nucleon iron ions, or 575 MeV/nucleon iron ions followed by transfer of the conditioned medium from the irradiated cells to unirradiated test cells. The effects studied included DNA double-strand break induction, {gamma}-H2AX focus formation, induction of chromatid breaks in prematurely condensed chromosomes, and micronucleus formation using DNA repair-proficient and -deficient hamster and human cell lines (xrs6, V79, SW48, MO59K and MO59J). Cell survival was also measured in SW48 bystander cells using X rays. Although it was occasionally possible to detect an increase in chromatid break levels using nitrogen ions and to see a higher number of {gamma}-H2AX foci using nitrogen and iron ions in xrs6 bystander cells in single experiments, the results were not reproducible. After we pooled all the data, we could not verify a significant bystander effect for any of these end points. Also, we did not detect a significant bystander effect for DSB induction or micronucleus formation in these cell lines or for clonogenic survival in SW48 cells. The data suggest that DNA damage and cytogenetic changes are not induced in bystander cells. In contrast, data in the literature show pronounced bystander effects in a variety of cell lines, including clonogenic survival in SW48 cells and induction of chromatid breaks and micronuclei in hamster cells. To reconcile these conflicting data, it is possible that the epigenetic status of the specific cell line or the precise culture conditions and medium supplements, such as serum, may be critical for inducing bystander effects.

  15. Let T be a locally finite rooted tree and Iso(T) be the group of all isometries of T.

    E-Print Network [OSTI]

    Ivanov, Aleksander

    Let T be a locally finite rooted tree and Iso(T) be the group of all isometries of T. Iso(T) is profinite with respect to canonical n: Iso(T) Iso(Tn ) , n, where Tn consists of the first n levels. #12| . PGL2 (p ) fixes the vertex p x p . 3. Branch groups. A closed subgroup GIso(T) is a branch (weakly

  16. Depth absorbed dose and LET distributions of therapeutic {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C beams

    SciTech Connect (OSTI)

    Kempe, Johanna; Gudowska, Irena; Brahme, Anders [Division of Medical Radiation Physics, Department of Oncology-Pathology, Karolinska Institutet and Stockholm University, Box 260, SE-171 76 Stockholm (Sweden)

    2007-01-15T23:59:59.000Z

    The depth absorbed dose and LET (linear energy transfer) distribution of different ions of clinical interest such as {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C ions have been investigated using the Monte Carlo code SHIELD-HIT. The energies of the projectiles correspond to ranges in water and soft tissue of approximately 260 mm. The depth dose distributions of the primary particles and their secondaries have been calculated and separated with regard to their low and high LET components. A LET value below 10 eV/nm can generally be regarded as low LET and sparsely ionizing like electrons and photons. The high LET region may be assumed to start at 20 eV/nm where on average two double-strand breaks can be formed when crossing the periphery of a nucleosome, even though strictly speaking the LET limits are not sharp and ought to vary with the charge and mass of the ion. At the Bragg peak of a monoenergetic high energy proton beam, less than 3% of the total absorbed dose is comprised of high LET components above 20 eV/nm. The high LET contribution to the total absorbed dose in the Bragg peak is significantly larger with increasing ion charge as a natural result of higher stopping power and lower range straggling. The fact that the range straggling and multiple scattering are reduced by half from hydrogen to helium increases the possibility to accurately deposit only the high LET component in the tumor with negligible dose to organs at risk. Therefore, the lateral penumbra is significantly improved and the higher dose gradients of {sup 7}Li and {sup 12}C ions both longitudinally and laterally will be of major advantage in biological optimized radiation therapy. With increasing charge of the ion, the high LET absorbed dose in the beam entrance and the plateau regions where healthy normal tissues are generally located is also increased. The dose distribution of the high LET components in the {sup 7}Li beam is only located around the Bragg peak, characterized by a Gaussian-type distribution. Furthermore, the secondary particles produced by high energy {sup 7}Li ions in tissuelike media have mainly low LET character both in front of and beyond the Bragg peak.

  17. 11406. Proposed by A. A. Dzhumadil'daeva, Almaty, Republics Physics and Mathematics School, Almaty, Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2,

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    , Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2

  18. In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

    2012-09-17T23:59:59.000Z

    Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), “Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events,” adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, §50.61a, published on January 4, 2010, entitled “Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events” (75 FR 13). Use of the new rule by licensees is optional. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensee’s reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with §50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in §50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

  19. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29T23:59:59.000Z

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  20. WBS-FOR CREATING AN ER-MODEL Let A(Ei) = the set of attributes of entity-set an Ei.

    E-Print Network [OSTI]

    Kundu, Sukhamay

    WBS-FOR CREATING AN ER-MODEL · Let A(Ei) = the set of attributes of entity-set an Ei. · Let A from each Ei partici- pating in Rj, can interact multiple times, then we need a pri- mary key among FOR CREATING ER-MODELS Identify name and A(Ei) for each Ei Identify a primary key for each Ei Identify name

  1. Comparisons of LET Distributions for Protons with Energies between50 and 200 MeV Determined Using a Spherical Tissue-EquivalentProportional Counter (TEPC) and a Position-Sensitive Silicon Spectrometer(RRMD-III)

    SciTech Connect (OSTI)

    Borak, Thomas B.; Doke, Tadayoshi; Fuse, T.; Guetersloh, StephenB.; Heilbronn, Lawrence H.; Hara, K.; Moyers, Michael; Suzuki, S.; Taddei, Phillip; Terasawa, K.; Zeitlin, Cary J.

    2004-12-01T23:59:59.000Z

    Experiments have been performed to measure the response of a spherical tissue-equivalent proportional counter (TEPC) and a silicon-based LET spectrometer (RRMD-III) to protons with energies ranging from 50 200 MeV. This represents a large portion of the energy distribution for trapped protons encountered by astronauts in low-Earth orbit. The beam energies were obtained using plastic polycarbonate degraders with a monoenergetic beam that was extracted from a proton synchrotron. The LET spectrometer provided excellent agreement with the expected LET distribution emerging from the energy degraders. The TEPC cannot measure the LET distribution directly. However, the frequency mean value of lineal energy, y bar f, provided a good approximation to LET. This is in contrast to previous results for high-energy heavy ions wherey barf underestimated LET, whereas the dose-averaged lineal energy, y barD, provided a good approximation to LET.

  2. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  3. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  4. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  5. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  6. Let's Talk Turkey -Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey.

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Let's Talk Turkey - Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey. Follow the rules and the guidelines in this fact sheet to keep your turkey safe and delicious. What to do when you get the turkey Take the turkey home right after you get it. Put

  7. Cluster characters II: A multiplication formula Let C be a Hom-finite triangulated 2-CalabiYau category with a cluster tilting object. Under

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cluster characters II: A multiplication formula Yann Palu Abstract Let C be a Hom categories of modules over a preprojective algebra of Dynkin type, we prove a multiplication formula for the cluster character associated with any cluster tilting object. This formula generalizes those obtained

  8. Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the

    E-Print Network [OSTI]

    Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the other with rinse water. Run your washing machine and dishwasher only instead and save gallons every time. For cold drinks keep a pitcher of water in the refrigerator instead

  9. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make that are needed are turned on, and that these are turned off again as you leave the building. Don't leave any non

  10. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make leave the building. Don't leave any non-essential items on standby - appliances such as televisions left

  11. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPointsInjection1 - FY8

  12. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment of Energy

  13. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...

    Office of Environmental Management (EM)

    T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  14. Let the show begin

    SciTech Connect (OSTI)

    Alperowicz, N.

    1993-01-27T23:59:59.000Z

    Major changes should occur in the European polyolefins industry this year. BASF's (Ludwigshafen) polypropylene (PP) deal with ICI is expected to be followed by that of Hoechst (Frankfurt) and Petrofina (Brussels). The two are engaged in feasibility studies for a possible joint venture in PP and are expected to make a decision in the second quarter of this year. Shell and Himont are on track to complete their feasibility study in the first quarter for a polyolefins joint venture. And Huels and PCD are still in talks. But two new possible deals, a polyolefins merger between Nests (Helsinki) and Statoil (Stavanger) and an alliance in PP involving Appryl, the Elf Atochem (51%)/BP Chemicals (49%) joint venture, and Solvay have been denied. The Hoechst/Fina venture would initially encompass only the two companies European plants - Hoechst's 550,000-m.t./year and Fina's 180,000 m.t./year. In addition, Fina would either build or acquire another PP plant. In the second stage, the partners could bring in their overseas plants. Fina has plants in the US, and Hoechst has a combined 100,000 m.t./year in south Africa and Australia. Neste's board member Jukka Viinanen says the only talks between Nests and Statoil center on renegotiations of ethylene supply contract at Stenungsund, Sweden. Nests wants a more flexible deal on quantity and price. It needs 400,000 m.t./year of ethylene for its downstream plants. Viinanen adds that he is worried about the European petrochemical industry and producers need to do everything to improve margins through pricing policies and obtaining a balance between supply and demand. On the possibility of a future link with Statoil he comments, One can never say never. It would take time. We don't feel in a very vulnerable position right now.

  15. Never Let Me Down

    E-Print Network [OSTI]

    Shoshanna

    1992-01-01T23:59:59.000Z

    little. "Would you believe it? Shot the RT out of my hand. One in a million." And he flexed his fingers, wincing. Two knuckles were red and swollen, where they had been twisted by the impact "Need a doctor?" "Nah. Ice'll do it" Jax and Murphy were...

  16. Let's Not Forget Plants

    E-Print Network [OSTI]

    Donald, Athene

    2014-10-08T23:59:59.000Z

    with neutrons where one had the additional tool of using 'contrast' by changing the amount of heavy water in the solution: hydrogen and deuterium scatter neutrons very differently so this provides additional insight as to what is going on as water enters... that is present in the cells can also shift from one starch polymorph to another. In order to make sense of what was going on I had to understand the starch as a material better. We turned to X-ray scattering to explore the internal granule structure. A lot...

  17. Let's Go Veggie!

    E-Print Network [OSTI]

    2014-08-30T23:59:59.000Z

    to 100 tonnes of waste per week, the Ontario Ministry of Agriculture estimates. And where does it go? ... mer heat or sub-zero cold. Agriculture Canada has ...

  18. Evaluation on the Feasibility of Using Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density/Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.

    2014-06-10T23:59:59.000Z

    This technical letter report provides the status of an assessment undertaken by PNNL at the request of the NRC to verify the capability of periodic ASME-required volumetric examinations of reactor vessels to characterize the density and distribution of flaws of interest for applying §50.61a on a plant-by-plant basis. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), "Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events," establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. Recently, the NRC completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed and promulgated an alternate PTS rule, §50.61a, that can be implemented by PWR licensees. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants.

  19. Problem Sheet 1 of 8 Problem 1. Let P1 = (1, 0, 0), P2 = (0, 1, 0) and P3 = (0, 0, 1).

    E-Print Network [OSTI]

    Argerami, Martin

    Problem Sheet 1 of 8 Problem 1. Let P1 = (1, 0, 0), P2 = (0, 1, 0) and P3 = (0, 0, 1). (a) Show that P1, P2, P3 are not aligned. (b) Find a vector parametric equation for the plane P passing through P1, P2, P3. (c) Find normal and standard equation for P. (d) Find a vector parametric equation

  20. Governor, BoT, Chancellor, Presidents, Faculty, Students, and Friends of CSU. It is time to re-align the mission and budget. Let's review the basic game plan. We are ALL on the same

    E-Print Network [OSTI]

    Shubin, Carol

    -align the mission and budget. Let's review the basic game plan. We are ALL on the same team. Now, we do have to put Californians back on the road to prosperity. Higher education can help the economy grow

  1. 11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n n matrices. Show that if AB -BA is invertible and A2

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n Ã? n matrices. Show that if AB - BA is invertible and A2 + B2 = 3(AB - BA

  2. Error of law and flawed administrative acts

    E-Print Network [OSTI]

    Feldman, David

    2014-07-17T23:59:59.000Z

    , n. 1 above; R. v Panel on Takeovers and Mergers, ex parte Datafin plc [1987] Q.B. 815, CA; R. (Cart) v Upper Tribunal (Public Law Project and another intervening), n. 7 above. 28 R. (Shoesmith) v Ofsted [2011] EWCA Civ 642, [2011] P.T.S.R. 1459... 30 R. v Panel on Takeovers and Mergers, ex parte Guinness plc [1990] 1 Q.B. 146 at 177, [1989] 1 All E.R. 509 at 526, CA, per Lord Donaldson M.R. See also R. v Secretary of State for the Home Department, ex parte Swati and Butt [1986] 1 W.L.R. 477...

  3. Flaws in the Non-Proliferation Treaty

    SciTech Connect (OSTI)

    Leventhal, P.

    1985-09-01T23:59:59.000Z

    The current review conference must come to grips with serious weaknesses in the Non-Proliferation Treaty (NPT), especially regarding the spread of weapons-grade material and the continuing superpower arms race. One-third of the world's nations, including two of the original nuclear-weapons states (France and China), have not signed the NPT, and some countries are trying to buy nuclear weaponry without developing a domestic capability. The greatest danger is latent proliferation through the acquisition of materials and capabilities for peaceful power and research programs. The author recommends modifying the NPT to restrict nuclear trade, improve International Atomic Energy Agency inspections and audits, expand safeguards coverage to nonparties of the Treaty, and set minimum standards for guarding international shipments.

  4. The flaw in the firewall argument

    E-Print Network [OSTI]

    Samir D. Mathur; David Turton

    2014-05-28T23:59:59.000Z

    A lot of confusion surrounds the issue of black hole complementarity, because the question has been considered without discussing the mechanism which guarantees unitarity. Considering such a mechanism leads to the following: (1) The Hawking quanta with energy E of order the black hole temperature T carry information, and so only appropriate processes involving E>>T quanta can have any possible complementary description with an information-free horizon; (2) The stretched horizon describes all possible black hole states with a given mass M, and it must expand out to a distance s_{bubble} before it can accept additional infalling bits; (3) The Hawking radiation has a specific low temperature T, and infalling quanta interact significantly with it only within a distance s_{alpha} of the horizon. One finds s_{alpha} >T, and this removes the argument against complementarity recently made by Almheiri et al. In particular, the condition E>>T leads to the notion of 'fuzzball complementarity', where the modes around the horizon are indeed correctly entangled in the complementary picture to give the vacuum.

  5. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan [UT Health Science Center at San Antonio; Xu, Nancy R [Old Dominion University; Mohan, Sumathy [UT Health Science Center at San Antonio

    2013-06-03T23:59:59.000Z

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  6. PNSQC 2013 Call for Abstracts is now open let us know how you see quality today! Put your face on quality and be part of the speaker program by submitting an abstract for a

    E-Print Network [OSTI]

    Chapman, Michael S.

    platforms, Quality across the team, Quality across roles as tester, developer, project manager such as legal, medical, banking, Quality in management, processes, team interactions, Quality in estimatingPNSQC 2013 Call for Abstracts is now open ­ let us know how you see quality today! Put your face

  7. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link: Register through Employee Self Service (ESS) CHRIS SystemFor organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  8. MaximumLetThrough.PDF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of QuadrupoleSextupole Power Converters The corrector power converters use an ' H' -bridge arrangement to provide a bipolar output. The arrangement is shown in Figure 3, with...

  9. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link: Register through Employee Self Service (ESS) CHRIS System.For organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  10. 11601. For any prime p and positive integer n, let N(p, n) denote the dif-ference between the number of p's appearing as factors in the denominator

    E-Print Network [OSTI]

    Karaivanov, Borislav

    11601. For any prime p and positive integer n, let N(p, n) denote the dif- ference between the number of p's appearing as factors in the denominator of Fn and the number of those appearing in the numerator of Fn. Clearly, Fn is an integer if and only if N(p, n) 0 for all primes p. The idea of the proof

  11. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary...

  12. On Pablo Triana's "The Flawed Math of Financial Models"

    E-Print Network [OSTI]

    Shreve, Steven E.

    - wide financial crisis on "quants" in the finance industry and the programs that educate them. Mr. Pablo quant takes to heart Albert Einstein's words, "As far as the laws of mathematics refer to reality the financial crisis, we have invited participants in the crisis to speak in detail to our students about deals

  13. Flaw-detection characteristics of the compact MIB-4 betatron

    SciTech Connect (OSTI)

    Boiko, D.A.; Filimonov, A.A.; Chakhlov, V.L.

    1987-09-01T23:59:59.000Z

    The compact pulse betatron using electrons accelerated to an energy of up to 4 MeV (MIB-4) is designed for the radiographic inspection of reinforced-concrete structures and buildings, welded joints, various materials, and assemblies. Information which refines and complements the method of inspecting parts by means of the MIB-4 device is provided. The results obtained in testing this equipment abroad are given.

  14. Fractographic investigation of flaws in sintered SiC fiber

    SciTech Connect (OSTI)

    Srinivasan, G.V.; Venkateswaran, V. [Carborundum Company, Niagara Falls, NY (United States)

    1996-12-31T23:59:59.000Z

    The Carborundum Company has developed a continuous process to produce multifilament, polycrystalline SiC fiber tow. The process uses a melt spinning approach to make the green fibers wherein the submicron SiC powder is mixed with polymers and the resulting compound is melt spun and extruded through a spinnerette. After extraction, the green fibers are sintered in a continuous sintering line. The properties of this fiber are given. This paper will describe the use of fractography in directing the fiber developmental efforts, specifically on characterization of strength-limiting defects and their origination. Fractographic analysis is also extended to determining strength of fibers at any gauge length and in identifying artifacts associated with the tensile strength testing technique.

  15. Flawed analysis of the possibility of air capture

    E-Print Network [OSTI]

    and energetic analysis of cap- turing CO2 from ambient air," House et al. (1) drew an analogy between air, New York, NY 10027; and c Global Thermostat, New York, NY 10025 1. House KZ, et al. (2011) Economic and energetic analysis of capturing CO2 from ambient air. Proc Natl Acad Sci USA 108:20428­20433. 2. Lackner K

  16. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  17. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  18. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the VPN management interface, access data recently submitted by the target user via...

  19. Professor Clive Brasier, Forest Research UK Scientific and operational flaws

    E-Print Network [OSTI]

    circinatum, recently reported from Spain, Italy; now spread to Portugal? .. Photos: Joan Webber Forest and mortality of cork oaks and holm oaks in Spain and Portugal. Origin: Pacific-Celebes area. Phytophthora cinnamomi root disease of Q. ilex, Spain Photo Forest Research UK #12;Phytophthora alni sp. nov. on alder

  20. Flaw-limited transport in germanium-on-silicon photodiodes

    E-Print Network [OSTI]

    Orcutt, Jason S. (Jason Scott)

    2008-01-01T23:59:59.000Z

    Epitaxial germanium growth on silicon substrates has enabled a new class of photodiodes that can be integrated with traditional silicon electronics. Previous workers using lowthroughput growth techniques have demonstrated ...

  1. U-238: HP Service Manager Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

  2. U-139: IBM Tivoli Directory Server Input Validation Flaw | Department...

    Broader source: Energy.gov (indexed) [DOE]

    can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before...

  3. U-147:Red Hat Enterprise MRG Grid Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input.

  4. Impedance sensing of flaws in non-homogeneous materials

    DOE Patents [OSTI]

    Novak, J.L.

    1997-02-11T23:59:59.000Z

    An apparatus and method are disclosed for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths. 10 figs.

  5. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple

  6. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|Attacks |1:

  7. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  8. Research Note on a Parabolic Heat-Balance Integral Method with Unspecified Exponent: An Entropy Generation Approach in Optimal Profile Determination

    E-Print Network [OSTI]

    Jordan Hristov

    2010-12-12T23:59:59.000Z

    The heat-balance integral method of Goodman is studied with two simple 1-D heat conduction problems with prescribed temperature and flux boundary conditions. These classical problems with well known exact solutions enable to demonstrate the heat-balance integral method performance by a parabolic profile and the entropy generation minimization concept in definition of the appropriate profile exponent. The basic assumption generating the additional constraints needed to perform the solution is based on the requirement to minimize the difference in the local thermal entropy generation rates calculated by the approximate and the exact profile, respectively. This concept is easily applicable since the general concept has simple implementation of the condition requiring the thermal entropy generations calculated through both profiles to be the same at the boundary. The entropy minimization generation approach automatically generates the additional requirement which is deficient in the set of conditions defined by the heat-balance integral method concept.

  9. Letting the Brain Speak for itself

    E-Print Network [OSTI]

    Gerhard Werner

    2011-07-20T23:59:59.000Z

    Metaphors of Computation and Information tended to detract attention from the intrinsic modes of neural system functions, uncontaminated by the observer's role for collection and interpretation of experimental data. Recognizing the self-referential mode of function, and the propensity for self-organization to critical states requires a fundamental re-orientation with emphasis on the conceptual approaches of Complex System Dynamics. Accordingly, local cooperative processes, intrinsic to neural structures and of fractal nature, call for applying Fractional Calculus and models of Random Walks in Theoretical Neuroscience studies.

  10. SGA Biennial Meeting Let's Talk Ore Deposits

    E-Print Network [OSTI]

    Barton, Mark D.

    Institute for Mineral Resources, University of Arizona, Tucson, AZ 85721 U.S.A. * now at Bronco Creek Multiple igneous-related hydrothermal systems and related IOCG mineralization, near Copiapó, Chile Mark D about metal sources and traps, however similar patterns in many Cordilleran and global IOCG districts

  11. Letting Go: True autonomy in an AUV

    E-Print Network [OSTI]

    Griffiths, Gwyn

    Will be needed if we are to explore the ocean beneath EuropaÕs ice-covered surface. #12;Satellite images,000 feet Which is which? #12;Face of the Ronne Ice Shelf, Antarctica `To penetrate this barrier) Distancefromseasurface(m) Start Point Surfacing for GPS position fixing Terrain Following #12;Studies in Upper Ocean

  12. 1. Introduction Logic controllers are used in an increasing number of sys-

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    systems, transport systems, power plants and production systems. Numerous components of our daily lives is designed or at avoid- ing flaws during design. The first approach consists in letting the control system by using model-checking techniques (Bérard et al., 1999) pro- vided that control laws can be formally

  13. Electric Vehicle Manufacturing in Southern California: Current Developments, Future Prospects

    E-Print Network [OSTI]

    Scott, Allen J.

    1993-01-01T23:59:59.000Z

    oil Oil/water separator sludge Unspecified waste offsludge Metal dust Other morgamc solid waste Halogenatedsolvents Oxygenatedsolvents Hydrocarbon solvents Unspecified solvent mlxture Waste andmixed oil

  14. 0 % 10% 20% 30% 40% Interne t (16)

    E-Print Network [OSTI]

    Doyle, Robert

    . of Environmental Conservation Assistant Environmental Analyst Unspecified NY PreClarity Software Engineer Victor NY state Accenture Consultant Unspecified NA All Clear Environmental Services, Inc Project Manager Fort

  15. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  16. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  17. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  18. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  19. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS:...

  20. Yaakov Katz, Jerusalem Post, 2004.08.24: "Police drill reveals security flaws in malls

    E-Print Network [OSTI]

    Bernstein, Daniel

    .03.29: #define NOCHAR -1 register int c; for (;;) { c = *p++; if (...) *q++ = '\\\\'; ... if (c != NOCHAR) if (q

  1. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  2. Fracture response of externally flawed aluminum cylindrical shells under internal gaseous detonation loading

    E-Print Network [OSTI]

    Barr, Al

    , there is a lack of standard guidance in designing and testing pressure vessels and piping under explosive-mechanics driven design and safety criteria for pressure vessels under gaseous detonation load- ing. At this time pipelines, nuclear plant, and petrochemical piping. This study may also guide forensic analysis

  3. COMPRESSION STRENGTH OF CARBON FIBER LAMINATES CONTAINING FLAWS WITH FIBER WAVINESS

    E-Print Network [OSTI]

    compression strengths and failure strains which are borderline for wind turbine blade designs, depending upon the subject of recent studies of blade materials [1-5] and earlier studies of aerospace prepreg laminates [5 by RTM. Recent interest in blade materials has shown a significant shift toward carbon fiber and hybrids

  4. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...

    Broader source: Energy.gov (indexed) [DOE]

    update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input. IMPACT: A remote user can cause denial of service...

  5. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis Related Articles V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks T-597: WordPress Multiple Security Vulnerabilities T-693: Symantec Endpoint...

  6. Two dynamical core formulation flaws exposed by a baroclinic instability test case

    E-Print Network [OSTI]

    Jablonowski, Christiane

    Jablonowski Department of Atmospheric, Oceanic and Space Sciences, University of Michigan, Ann Arbor, MI, USA or climate simulations if physical parameterizations or model components, like the ocean or ice, compensate

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  8. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site...

    Energy Savers [EERE]

    to be executed by the target user's browser. The code will originate from the site running the IBM Lotus iNotes software and will run in the security context of that site....

  9. T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...

    Office of Environmental Management (EM)

    IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...

  10. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment

  11. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartmentAttacks |

  12. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy 9: IBM

  13. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment

  14. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |

  15. U-001:Symantec IM Manager Input Validation Flaws | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146 (07/03)U

  16. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary CodeScripting Attacks |

  17. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of Energy AForgery, and

  18. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting Attacks |

  19. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScriptingAttacks |

  20. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  1. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment ofGainScripting

  2. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment of EnergySpoofAttacks |

  3. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  4. Paralely mezi slovinským a ?eským dramatem 60. let

    E-Print Network [OSTI]

    Jensterle-Doležal, Alenka

    2009-02-01T23:59:59.000Z

    , s ním bude plodit d?tí, pokra?ování rodi- ny, a na h?bitov? stejné už není dost místa. Ale rodina nechce žádné zm?ny, trhliny se musejí odstranit, ve h?e se musí pokra?ovat. Otec jen p?ipustí, že se dcera m?že p?kné starat o hrob a nosit na hrob...

  5. Removing the Entropy Screen- To Let the Second Law Show

    E-Print Network [OSTI]

    Steinmeyer, D.

    for a given step. For example, the work used (including the lost work) by a distillation column is simply the difference in Wp of the heat supplied to the reboiler and taken out in the condenser: W =Q'To[l/T - 1/'1' ] (9) condenser reboiler where... result is low. When we talk about "savins energy" what we usually mean is "not wasting work-. What we try to do when we design a process. is to use work as effectively as possible. It?s hard to do that if we can?t see it clear~y. This paper...

  6. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15T23:59:59.000Z

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  7. Rev: 10/8/2012 "Let Knowledge Serve the City"

    E-Print Network [OSTI]

    Bertini, Robert L.

    of Transportation (DOT) 5. The International Commission on Radiological Protection (ICRP) 6. The National Academy MAINTENANCE 19 RADIATION SAFETY OPERATIONS MANUAL #12;4 Rev: 10/8/2012 PORTLAND STATE UNIVERSITY RADIATION

  8. Audio sparse decompositions in parallel Let the greed be shared !

    E-Print Network [OSTI]

    Paris 7 - Denis Diderot, Université

    by absolute de- caying order, one observes a fast decay, typically a power law with some large negative harmonics of the musical content. With a smart quantization of these few large transform coefficients Abstract--Greedy methods are often the only practical way of solving very large sparse approximation

  9. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  10. A theoretical analysis of proportional counter response versus LET

    E-Print Network [OSTI]

    Martin, George Gerald

    1970-01-01T23:59:59.000Z

    crimlurator settin A computer program rvas devcloned to couple t'ie energy disLribution and IDT equation;. of Lhe five b, rta emitter, : argon-41& krypton-85, iodine-333, xenon-133 and cesium-137, for clcLccror chamber sizes oF 50 cm. v 10 crn. x I c. m.... Fwergy spectrum of the 8 rays from A-gon-41. 18 F'IG. B. Fnezgy spectrum of the 8 rays from Krypton-85. . . FIG. 9. Energ~ spectrum of the 8 rays from Iodine-131. . . 20 FIG. 10. FIG. 11. Energy spectrum of the 8 rays from Xenon-133. . . Energy...

  11. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  12. Let W1 and W2 be two wav

    E-Print Network [OSTI]

    B5 = ?. We define a regular disk in S×S as a generically embedded disk D such that the ..... 19. 5.8. Example. Suppose that the fronts propagate as it is shown in.

  13. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT:...

  14. Embryonic stem cells: don't let litigation put

    E-Print Network [OSTI]

    Feng, Jian

    research is not a threat to the federal funding of science. No, allowing research agendas to be dictated--joblossesmaybe anaturalconsequenceofinner-city depopulation.Evenundernormal circumstances,USjobturnoveris around5%permonth if their neighbourhoods have experienced the 76% depopulation that Mutter cites. NealHockleySchoolofEnvironment, Natural

  15. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Energy Savers [EERE]

    address their concerns, collect input on program ideas, and obtain real-time feedback on what is and is not working in the field. This strategy allowed for program...

  16. TEORIJA IN PRAKSA let. 47, 5/2010 Pedro PERISTA*

    E-Print Network [OSTI]

    Birmingham, University of

    expectancy at birth and decrease in death rates are reducing this decline but they in turn pose a significant- teristic Portuguese emigration, the decreasing birth rates are far below the level needed and creating important challenges for a late and weak welfare state * Pedro Perista, researcher, CESIS ­ Centre

  17. Cards let a PDP-11 work like a VAX

    SciTech Connect (OSTI)

    Barney, C.

    1984-05-17T23:59:59.000Z

    The PDP-11 computer is still used widely, in part because of its many peripherals and software applications. For less than $7000, a new board-level product from American Information Systems Inc. promises to give the PDP-11 renewed life as a dual processor based on a UNIX-like operating system with more power than a VAX, its younger superminicomputer cousin. National Semiconductor Corp's 32032 is the foundation of the AIS/3210 system, which also includes a national 16082 memory-management chip and a 16081 floating-point-processor chip. One or more processor boards and memory boards from AIS plug directly into a 16-bit q bus.

  18. Let's Stay Together: A Case for Special Education Teacher Retention

    E-Print Network [OSTI]

    Robinson, Sandra Lee

    2010-01-01T23:59:59.000Z

    likely to opt for early retirement. By contrast, the generalmore likely to opt for early retirement. The results of thefactors behind SETs early retirement would provide critical

  19. Letting Down the Team? Social Effects of Team Incentives

    E-Print Network [OSTI]

    Babcock, Philip; Bedard, Kelly; Charness, Gary; Hartman, John; Royer, Heather

    2012-01-01T23:59:59.000Z

    incentives with a much larger bonus payment contingent onincentive, the awarding of the bonus was dependent on bothdefaults, no one earns the bonus. 7 While this may seem less

  20. U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Lifecycle Attachmate Downloads SecurityTracker Alert ID: 1026340 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Attachmate Reflection. A remote user...

  1. "Let Their Eyes Testify" An Interview with Nana Mahomo

    E-Print Network [OSTI]

    Gabriel, Teshome H.

    1976-01-01T23:59:59.000Z

    weapons on license from the Belgians, the Italians and the British, so they don't really need to buy

  2. Exercise 1. Let (P) be the following linear program

    E-Print Network [OSTI]

    Rapaport, Iván

    of G such that eM c(e) is minimum.Fr A company of petrol wishes to explore oil reservoirs. Once petrol. At this point individual oil traps (target) can be specified more precisely. In most situations

  3. 19JULY 2010 Let us bring technology news to you.

    E-Print Network [OSTI]

    Greenberg, Saul

    of the prototypes require batteries to operate, which wouldn't be practical for commercial uses, according to Juels. However, produc- tion versions wouldn't necessarily need batteries, Marquardt said, The experimental chip would contain general information and enable over- the-air access by a reader, while the other

  4. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  5. 1220 Comment sufficient to meet bacterial needs (let alone

    E-Print Network [OSTI]

    of the recycling of organic carbon by consumers may help to explain apparently excessive demands of consumers- has led to the assertion that bacterial sec- toplankton supply in the summer epilim- ondary production

  6. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 13: 164168 (2012)

    E-Print Network [OSTI]

    Waugh, Darryn W.

    2012-01-01T23:59:59.000Z

    in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/asl.384 Antarctic ozone depletion and trends using National Centers for Environmental Prediction/National Center for Atmospheric Research (NCEP) concentrations and sea- surface temperatures (SSTs). These integrations enable the relative role of ozone

  7. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 12: 5157 (2011)

    E-Print Network [OSTI]

    Guichard, Francoise

    2011-01-01T23:59:59.000Z

    in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/asl.288 The large-scale water cycle de Recherche en Geodesie, Institut Geographique National, ENSG ­ Cite Descartes, 6-8 Avenue Blaise of West Africa, such as the role of moisture trans- ported by the southwesterly low-level monsoon flow

  8. TQM, ISO 9000, and Commissioning (Let's Be Practical)

    E-Print Network [OSTI]

    Dunn, W.; Berner, W.

    2002-01-01T23:59:59.000Z

    consistent performance. International Standards Organization (ISO) applies discipline to that concept requiring a structured well-documented management environment capable of withstanding an audit. One could quickly build a library in the study of management...

  9. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  10. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9MorganYou areInnovationPriority |Going theRaising

  11. Let's Work on Your IDP | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t hLessonsLessons from

  12. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment of Energy Ready,Smart GridAboutWindowsBostonDepartment

  13. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis SuccessEnergy

  14. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of

  15. Let’s Disagree to Agree: Angélico Chávez Reads Willa Cather’s Death Comes for the Archbishop

    E-Print Network [OSTI]

    Dettman, Jonathan

    2015-01-01T23:59:59.000Z

    Journal 57 (2012): n. pag. Web. 5 May 2015. Ha? ma? la?East Lansing, Michigan. Web. 8 Oct. 2013. ---. Regions of La2011. NPS.gov. 13 Sept. 2013. Web. 6 Sept. 2013. Williams,

  16. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  17. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  18. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.; Sheen, S.H.; Wheeler, M.J.

    1992-05-01T23:59:59.000Z

    Characterization of ceramic matrix composites (continuous and whisker-type) by nondestructive evaluation (NDE) methods and an understanding of fracture behavior, together with correlation of fracture and NDE data, may provide insight into the prediction of component performance and the development of process technology. Knowledge of the degradation extent of fiber tows or monofilament degradation after processing, extent of open porosity before densification, and filament/fiber alignments before and after processing are also examples of important variables to be measured. Work in this program has emphasized continuous fiber ceramic matrix composites (CFCCs) that use chemical vapor infiltration (CVI)-infiltrated SiC/SiC materials, primarily those made of Nicalon satin or plain weave with 16 {times} 16 tows/in. in 2-D layups. All studied samples were provided by Oak Ridge National Laboratory and were made using 100 layers per inch. CVI specimens with 0/30/60, 0/90, and 0/45 were examined by 3-D X-ray microtomography to characterize in-plane fiber orientations. Current information suggests that for Nicalon-type fiber architecture, a {plus minus}2--1/2{degrees} misalignment may not affect mechanical properties. Thus the near-term goal has been to establish a detection capability for angular orientation. By using 512 {times} 512 images from 3-D X-ray CT data with pixel sizes of < 140 {mu}m and a special 2-D fast-Fourier transform image processing analysis, we have shown that fiber orientations to {plus minus}2--1/2{degrees} with SiC/SiC CVI type 2-D weave architecture can be measured.

  19. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Sivers, E.A.; Holloway, D.L.; Jacobs, T.D.; Dieckman, S.L.; Singh, D.

    1994-05-01T23:59:59.000Z

    In the NDE area, specimens with different cloth lay-up orientations were examined by a 3-D X-ray microtomography device and image processing to measure and map in-plane fiber orientations. Results show detection sensitivity to better than {plus_minus}3{degrees}. We establish detection of 3-D braid/weave fiber orientation and spacing. Another NDE method, multinuclear ({sup 13}C,{sup 29}Si, and {sup 11B} NMR spectroscopy, is being developed to determine the chemical state of the fiber surface and its potential impact on fiber pullout. We have conducted initial studies to investigate sensitivity to bulk composition of the matrix materials (a,b, amorphous phase, silica, and oxynitride concentration). The first {sup 29}Si NMR experiments focused on methods to enhance the signal from the surface by selectively reducing surface relaxation. Additionally, we have determined that there is sufficient sensitivity of {sup 11}B NMR for monitoring fiber coatings.

  20. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.; Sheen, S.H.; Wheeler, M.J.

    1992-05-01T23:59:59.000Z

    Characterization of ceramic matrix composites (continuous and whisker-type) by nondestructive evaluation (NDE) methods and an understanding of fracture behavior, together with correlation of fracture and NDE data, may provide insight into the prediction of component performance and the development of process technology. Knowledge of the degradation extent of fiber tows or monofilament degradation after processing, extent of open porosity before densification, and filament/fiber alignments before and after processing are also examples of important variables to be measured. Work in this program has emphasized continuous fiber ceramic matrix composites (CFCCs) that use chemical vapor infiltration (CVI)-infiltrated SiC/SiC materials, primarily those made of Nicalon satin or plain weave with 16 {times} 16 tows/in. in 2-D layups. All studied samples were provided by Oak Ridge National Laboratory and were made using 100 layers per inch. CVI specimens with 0/30/60, 0/90, and 0/45 were examined by 3-D X-ray microtomography to characterize in-plane fiber orientations. Current information suggests that for Nicalon-type fiber architecture, a {plus_minus}2--1/2{degrees} misalignment may not affect mechanical properties. Thus the near-term goal has been to establish a detection capability for angular orientation. By using 512 {times} 512 images from 3-D X-ray CT data with pixel sizes of < 140 {mu}m and a special 2-D fast-Fourier transform image processing analysis, we have shown that fiber orientations to {plus_minus}2--1/2{degrees} with SiC/SiC CVI type 2-D weave architecture can be measured.

  1. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  2. Radiation and Reason Why radiation at modest dose rates is quite harmless and current radiation safety regulations are flawed

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Data on the impact of ionising radiation on life are examined in the light of evolutionary biology. This comparison confirms that fear of nuclear radiation is not justified by science itself; rather it originates in a failure of public trust in nuclear science, a relic of the international politics of the Cold War era. Current ionisation safety regulations appease this fear but without scientific support and they need fundamental reformulation. This should change the reaction to accidents like Fukushima, the cost of nuclear energy and the application of nuclear technology to the supply of food and fresh water. Such a boost to the world economy would require that more citizens study and appreciate the science involved – and then tell others -- not as much fun as the Higgs, perhaps, but no less important! www.radiationandreason.com

  3. AN IMPROVED TREATMENT OF RESIDUAL STRESSES IN FLAW ASSESSMENT OF PIPES AND PRESSURE VESSELS FABRICATED FROM FERRITIC STEELS

    E-Print Network [OSTI]

    Michaleris, Panagiotis

    draft of API RP-579, Recommended Practice for Fitness-for-Service. INTRODUCTION When performing standards. While welding residual stresses can reach or exceed yield in certain situations. These recommendations have been proposed for inclusion in the current draft of API RP-579, Recommended Practice

  4. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S. [Powertech Labs. Inc., Surrey, British Columbia (Canada); Sperling, E.J. [Amoco Corp., Naperville, IL (United States); Shen, G. [CANMET, Ottawa, Ontario (Canada). Metals Technology Labs.; Yin, H. [Mobil Research and Development Corp., Farmers Branch, TX (United States); Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States)

    1996-12-01T23:59:59.000Z

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication related lack-of-fusion defects, an artificially induced fatigue crack and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach; The welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  5. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S. [Powertech Labs Inc., Surrey, British Columbia (Canada); Sperling, E.J. [BP-Amoco, Calgary, Alberta (Canada); Shen, G. [CANMET, Ottawa, Ontario (Canada). Metals Technology Labs.; Yin, H. [Mobil Technology Co., Dallas, TX (United States); Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States)

    1999-08-01T23:59:59.000Z

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics-based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication-related lack-of-fusion defects, an artificially induced fatigue crack, and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach, The Welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach, and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen-charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  6. http://web.utk.edu/~auerbach/Goldman.htm THE GOLDMAN DATA SET

    E-Print Network [OSTI]

    Auerbach, Benjamin M.

    Autours Braives Ciply Trou Felix Canary Islands Unspecified Chile Tierra del Fuego Guinea New Britain Peru Cuzco Ancón Philippine Islands "Negrito" Russia Various locations Solomon Islands Unspecified South Africa "Bushman" Sudan El Kubanieh Kerma Sayala Toschke

  7. Jim Cochran: Swanton Berry Farm

    E-Print Network [OSTI]

    Farmer, Ellen

    2010-01-01T23:59:59.000Z

    plants. Let’s buy 7,000 trucks. Let’s own a biodiesel orthree biodiesel companies. Let’s own an insurance company.

  8. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    of the DCERPC Inspection Buffer Overflow Vulnerability may cause a stack overflow and permit the execution of arbitrary commands. Solution: The vendor has issued a fix. Addthis...

  9. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  10. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  11. Kronecker-Jacobi symbol and Quadratic Reciprocity Let Q be the ...

    E-Print Network [OSTI]

    2012-11-29T23:59:59.000Z

    Proof. Since d(2) = 8, the Theorem (with b = 2) reduces the problem to the simple cases a = 1,3,5,7. Corollary 3. If q is an odd prime, q? = (?1) q?1. 2 q, and a = 0 ...

  12. Stochastic modeling of the cell killing effect for low- and high-LET radiation

    E-Print Network [OSTI]

    Partouche, Julien

    2005-02-17T23:59:59.000Z

    Theoretical modeling of biological response to radiation describes qualitatively and quantitatively the results of radiobiological effects at the molecular, chromosomal, and cellular level. The repair-misrepair (RMR) model is the radiobiological...

  13. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input before displaying the...

  14. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  15. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  16. Let Our Freak Flags Fly”: Shrek the Musical and the Branding of Diversity

    E-Print Network [OSTI]

    Brater, Jessica; Vecchio, Jessica Del; Friedman, Andrew; Holmstrom, Bethany; Laine, Eero; Levit, Donald; Miller, Hillary; Savran, David; Smith, Carly Griffin; Watt, Kenn; Young, Catherine; Zazzali, Peter

    2010-05-01T23:59:59.000Z

    that is perceived, fairly or not, as a family show.”24 Despite the poor sales, the appearance of the bright green ogre on Broadway was part of DreamWorks’s efforts to sell out—to expand its mass-media market to reach new consumers in the economically minor.../opencms/company/investor_relations/annualreports.html (accessed 3 August 2009). 43 Jeffrey Katzenberg, “Dear Fellow Shareholders,” in ibid. 44 Ibid. 45 Steven Birenberg, “How More Media Companies Brave the Headwinds,” Yahoo! Finance, 15 De- cember 2008, available at http://finance.yahoo.com/news/How-More-Media...

  17. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01T23:59:59.000Z

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  18. ERROR IN LINEAR INTERPOLATION Let P1(x) denote the linear polynomial interpolating

    E-Print Network [OSTI]

    Atkinson, Kendall

    (x) - P1(x) = (x - x0) (x - x1) 2 f00(cx) for some cx between the minimum and maximum of x0, x1, and x cx x1 #12;(x - x0) (x1 - x) 0, x0 cx x1 and therefore (x - x0) (x1 - x) " log10 e 2x2 1 # log10]. Then f(x)-Pn(x) = (x - x0) (x - x1) · · · (x - xn) (n + 1)! f(n+1) (cx) with cx some point between

  19. Stochastic modeling of the cell killing effect for low- and high-LET radiation 

    E-Print Network [OSTI]

    Partouche, Julien

    2005-02-17T23:59:59.000Z

    Theoretical modeling of biological response to radiation describes qualitatively and quantitatively the results of radiobiological effects at the molecular, chromosomal, and cellular level. The repair-misrepair (RMR) model ...

  20. Let's talk about symbiosis! 9:15 Matthias Horn, Department of Microbiology and Ecosystem Science

    E-Print Network [OSTI]

    of Microbiology and Ecosystem Science Welcome Session 1 9:30 Julie Klose Session 2 11:30 Buck Hanson, Department of Microbiology and Ecosystem Science 13:30 Daryl Domman, Department of Microbiology and Ecosystem Science

  1. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  2. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    or logical Layer-2 network as the affected system to gain an unauthenticated root shell. REFERENCE LINKS: SecurityTracker Alert ID: 1028682 Secunia Advisory SA53730 Cisco...

  3. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    2.0.12.PatchesSoftware Downloads Update Firefox 3.6.14 Mozilla Downloads SeaMonkey 2.1 Beta 2 Addthis Related Articles T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML...

  4. Letting The Sun Shine On Solar Costs: An Empirical Investigation Of Photovoltaic Cost Trends In California

    E-Print Network [OSTI]

    Wiser, Ryan; Bolinger, Mark; Cappers, Peter; Margolis, Robert

    2006-01-01T23:59:59.000Z

    implications for solar suppliers and customers, and forover 11-years for customer-sited solar installations. Thiscost of customer-sited, grid-connected solar photovoltaic (

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server...

  6. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    the target resolver to crash IMPACT: Triggering this defect will cause the affected server to exit with an error, denying service to recursive DNS clients that use that...

  7. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  8. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  9. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  10. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  11. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  12. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  13. Caching for Bursts (C-Burst): Let Hard Disks Sleep Well and Work Energetically

    E-Print Network [OSTI]

    {fchen,zhang}@cse.ohio-state.edu ABSTRACT High energy consumption has become a critical challenge in all and Xiaodong Zhang Dept. of Computer Science & Engineering The Ohio State University Columbus, OH 43210, USA to save disk energy by transitioning an idle disk to a low-power mode. However, the achievable disk energy

  14. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user on the local network with the ability to conduct a man-in-the-middle attack can impersonate the kdump SSH server to potentially access information in vmcore dumps...

  15. Let my people go (home) to Spain: a genealogical model of Jewish identities since 1492

    E-Print Network [OSTI]

    Weitz, Joshua S

    2013-01-01T23:59:59.000Z

    The Spanish government recently announced an official fast-track path to citizenship for any individual who is Jewish and whose ancestors were expelled from Spain during the inquisition-related dislocation of Spanish Jews in 1492. It would seem that this policy targets a small subset of the global Jewish population, i.e., restricted to individuals who retain cultural practices associated with ancestral origins in Spain. However, the central contribution of this manuscript is to demonstrate how and why the policy is far more likely to apply to a very large fraction (i.e., the vast majority) of Jews. This claim is supported using a series of genealogical models that include transmissable "identities" and preferential intra-group mating. Model analysis reveals that even when intra-group mating is strong and even if only a small subset of a present-day population retains cultural practices typically associated with that of an ancestral group, it is highly likely that nearly all members of that population have dir...

  16. Dear Students, Welcome to the Social Progress, Social Change Freshman Interest Group! Let

    E-Print Network [OSTI]

    Oregon, University of

    as people tend to think; instead, we absorb myths that favor the majority, through media, humor, language in Columbia 150. Please be sure to be punctual, as we will be changing locations soon after gathering. Bring

  17. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  18. Regulation of let-7 miRNA biogenesis in C. elegans

    E-Print Network [OSTI]

    Kai, Zoya

    2011-01-01T23:59:59.000Z

    YROM , M. , J ARVIS , R. , C HENG , A. , L ABOURIER , E. , RA. G. , B HUTKAR , A. , Z HENG , G. X. , B OSSON , A. D. , NL ANCASTER , J. M. , C HENG , J. Q. & S ELLERS , T. A. (

  19. Let's eatfor the health of it ChooseMyPlate.gov

    E-Print Network [OSTI]

    choices. · Twice a week, make seafood the protein on your plate. · Eat beans, which are a natural source with little or no added sugars. · · · Drink water instead of sugary drinks. There are about 10 packets, not full. Cook more often at home, where you are in control of what's in your food. When eating out, choose

  20. TEORIJA IN PRAKSA let. 47, 5/2010 Pivi NAUMANEN, Hannu RUONAVAARA*

    E-Print Network [OSTI]

    Birmingham, University of

    other countries have experienced: the increase of early retirement in the 1990s and early 2000. Though on the planning and pre- paring for the retirement and old age by the Finnish home owning households. The authors, homeownership, retirement, old age care, housing equity Introduction A heated debate on retirement age

  1. TEORIJA IN PRAKSA let. 47, 5/2010 Jzsef HEGEDS, Hanna SZEMZ*

    E-Print Network [OSTI]

    Birmingham, University of

    the economic and financial pressure either went into early retirement or entered the large informal economy-AGE: FINANCING RETIREMENT AND CARE IN HUNGARY Abstract. Although discussions about aging and the consequences will focus on the analysis of these two processes influencing the strategy of households about retirement

  2. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Acting Director of the Information Security Oversight OfficeActing Director, Information Security Oversight Office,Chemical Safety Information, Site Security and Fuels

  3. On Human Culture Let us not dream that reason can ever be popular. Passions, emo-

    E-Print Network [OSTI]

    Page, Rex L.

    languages. John Viega and Gary McGraw in Building Secure Software, 2002 Procedural programming is a monumental waste of human energy. 1985 The only important design or engineering aid offered by the object oriented paradigm is abstract data types, and they have been in use for at least 40 years. 1999

  4. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  5. Intervention Let us assume for the moment that the evidence presented

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    at the August show. Its promoter, Annette Gelles of Showmasters Gun Shows, alleged that attendance had been

  6. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  7. Let Caches Decay: Reducing Leakage Energy via Exploitation of Cache Generational Behavior

    E-Print Network [OSTI]

    Martonosi, Margaret

    's proportion of total chip power will increase signi#12;cantly. This paper examines methods for reducing in high-performance CPUs. Although power used to mainly be a concern in battery-operated devices, thermal Department of Electrical Engineering Princeton University mrm@ee.princeton.edu Power dissipation

  8. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  9. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference...

  10. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  11. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were...

  12. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  13. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    in TCPIP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access. Impact: A remote...

  14. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and...

  15. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  16. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can partially access data on the target...

  17. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

  18. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    process when shutting down the Directory Server. Multiple scripts set the LDLIBRARYPATH environment variable to an insecure value containing an empty path CVE-2011-0532. A...

  19. Gravity Train Solution Let x(t) be the coordinate along the tunnel with ...

    E-Print Network [OSTI]

    2011-04-01T23:59:59.000Z

    Mar 31, 2011 ... means that in addition to fuel efficiency and saving the environment, we also ... the middle, when r = r0, and can be found from the Energy ...

  20. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  2. -News Home Help EU offers 'sweetener' to Japan to let France host nuclear project

    E-Print Network [OSTI]

    to host a revolutionary nuclear fusion project. news web sites "I cannot elaborate on the sweetener, but I Wednesday after talks in Vienna on the International Thermonuclear Experimental Reactor (ITER). news web ( - ) -- which have supported the Japanese bid -- plus Russia and China, which back the EU bid.news web sites

  3. LET dependence of radiation-induced bystander effects using human prostate tumor cells

    E-Print Network [OSTI]

    Anzenberg, Vered

    2008-01-01T23:59:59.000Z

    In the past fifteen years, evidence provided by many independent research groups have indicated higher numbers of cells exhibiting damage than expected based on the number of cells traversed by the radiation. This phenomenon ...

  4. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  6. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Broader source: Energy.gov (indexed) [DOE]

    Support & Downloads (2.0.6.RELEASE, 2.1.2.RELEASE). Addthis Related Articles V-013: EMC Avamar Client for VMware Discloses Server Password to Local Users T-575: OpenLDAP...

  7. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  8. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  9. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  10. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Environmental Management (EM)

    Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless Controller Cisco Wireless Controller Software for...

  11. Math 553 Practice for final December 13 2007 W. Heinzer 1. Let G ...

    E-Print Network [OSTI]

    2007-12-01T23:59:59.000Z

    If the finite group G has composition series 1 = N0 ? N1 ? N2 = G and 1 = M0 ? M1 ?···? Mr = G, prove that r = 2. 5. List representatives for each conjugacy ...

  12. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Hole, Classified Letters Regarding FBI Whistleblower Sibel90. 93. Democrats.com, FBI Whistleblower Breaks Ashcroft’s20edmonds. 94. Kevin Bohn, FBI Translator Suit Dismissed

  13. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe following presentationsExecute

  14. V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute

  15. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypassDepartment of

  16. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment ofRemote

  17. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec PGP

  18. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment of

  19. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment

  20. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of

  1. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment ofof

  2. V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartmentAttacksMozillaof

  3. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |Microsoft pulls

  4. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |Microsoft pullsof

  5. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |MicrosoftAppleAttacks,

  6. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities

  7. V-144: HP Printers Let Remote Users Access Files on the Printer |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department

  8. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |Disclosure

  9. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode

  10. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCodeService on the

  11. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCodeService onUsers

  12. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrack graphics4Dimitri Kusnezov -Purpose The Atomic

  13. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy: Thomas P.Department of Energy InternetHydrogenApril 30,Learn how

  14. his issue of Resource is about the future of agriculture, so let's talk

    E-Print Network [OSTI]

    is "the pre-eminent resource concerning expertise in food, fiber, water, and renewable energy resources will continue to grow and agricultural conditions in India will have major implications for the world. Forecasts show that India will surpass China in population sometime near the 2030 mark when it reaches nearly one

  15. Energy Efficiency is Over-Stated and Over-Rated: Let's Market the

    E-Print Network [OSTI]

    for a washing machine · Electrical Connection · Drain · A geothermal heat pump needs supply and return water) · Enabling thermal load sharing (Pool/water heating) · Longevity of system · Storm proofing (NYT · Air conditioner rejects heat · Pool heater needs heat · DHW needs heat, etc. After · Pool heater wants

  16. Let There Be Light! The Future of Memory Systems is Photonics and 3D Stacking

    E-Print Network [OSTI]

    Bergman, Keren

    National Lab {phhargrove,jshalf}@lbl.gov Bruce Jacob University of Maryland bji@umd.edu K. Scott Hemmert are not made or distributed for profit or commercial advantage and that copies bear this notice and the full

  17. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    and in the built-in media storage on the BlackBerry smartphone, but not email and other personal information stored on the file system of the BlackBerry smartphone. The following...

  18. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |

  19. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy3: RedLogin

  20. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and

  2. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks

  3. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgeryCode |

  4. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgeryCode

  5. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|

  6. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities

  7. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability | Department

  8. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  9. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain

  10. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |UsersSessions

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146

  12. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGain Unauthorizedquery.c|

  13. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGain

  14. U-047: Siemens Automation License Manager Bugs Let Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService or Execute

  15. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService

  16. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainServiceVulnerability

  17. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department

  18. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy

  19. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitraryPrivileges, Inject

  20. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department

  1. U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Departmentof

  2. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code

  3. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary

  4. U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupal MultipleAddress

  5. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCodeMultipleUsers

  6. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartment of

  7. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL

  8. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of

  9. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|

  10. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|Users

  11. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success Stories JuneExecute

  12. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success

  13. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:Users Deny

  14. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment of

  15. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  16. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecember 28, 2004 Part IIIDepartmentTurn

  17. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113: Debian42:

  18. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:

  19. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:Energy

  20. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2: